Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2021-4157
Vulnerability from cvelistv5
Published
2022-03-25 18:02
Modified
2024-08-03 17:16
Severity ?
EPSS score ?
Summary
An out of memory bounds write flaw (1 or 2 bytes of memory) in the Linux kernel NFS subsystem was found in the way users use mirroring (replication of files with NFS). A user, having access to the NFS mount, could potentially use this flaw to crash the system or escalate privileges on the system.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T17:16:04.290Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034342" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lore.kernel.org/lkml/20210517140244.822185482%40linuxfoundation.org/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20220602-0007/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "kernel", "vendor": "n/a", "versions": [ { "status": "affected", "version": "kernel 5.13-rc1" } ] } ], "descriptions": [ { "lang": "en", "value": "An out of memory bounds write flaw (1 or 2 bytes of memory) in the Linux kernel NFS subsystem was found in the way users use mirroring (replication of files with NFS). A user, having access to the NFS mount, could potentially use this flaw to crash the system or escalate privileges on the system." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-25T16:43:17", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034342" }, { "tags": [ "x_refsource_MISC" ], "url": "https://lore.kernel.org/lkml/20210517140244.822185482%40linuxfoundation.org/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20220602-0007/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2021-4157", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "kernel", "version": { "version_data": [ { "version_value": "kernel 5.13-rc1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An out of memory bounds write flaw (1 or 2 bytes of memory) in the Linux kernel NFS subsystem was found in the way users use mirroring (replication of files with NFS). A user, having access to the NFS mount, could potentially use this flaw to crash the system or escalate privileges on the system." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2034342", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034342" }, { "name": "https://lore.kernel.org/lkml/20210517140244.822185482@linuxfoundation.org/", "refsource": "MISC", "url": "https://lore.kernel.org/lkml/20210517140244.822185482@linuxfoundation.org/" }, { "name": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "name": "https://security.netapp.com/advisory/ntap-20220602-0007/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20220602-0007/" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2021-4157", "datePublished": "2022-03-25T18:02:43", "dateReserved": "2021-12-22T00:00:00", "dateUpdated": "2024-08-03T17:16:04.290Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2021-4157\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2022-03-25T19:15:09.703\",\"lastModified\":\"2024-11-21T06:37:01.807\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An out of memory bounds write flaw (1 or 2 bytes of memory) in the Linux kernel NFS subsystem was found in the way users use mirroring (replication of files with NFS). A user, having access to the NFS mount, could potentially use this flaw to crash the system or escalate privileges on the system.\"},{\"lang\":\"es\",\"value\":\"Se encontr\u00f3 un fallo de escritura fuera de los l\u00edmites de la memoria (1 o 2 bytes de memoria) en el subsistema NFS del kernel de Linux en la forma en que los usuarios usan el mirroring (replicaci\u00f3n de archivos con NFS). Un usuario, que tenga acceso al montaje NFS, podr\u00eda potencialmente usar este fallo para bloquear el sistema o escalar privilegios en el sistema\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.0,\"baseSeverity\":\"HIGH\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.1,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:A/AC:M/Au:S/C:C/I:C/A:C\",\"baseScore\":7.4,\"accessVector\":\"ADJACENT_NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":4.4,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0\",\"versionEndExcluding\":\"4.4.269\",\"matchCriteriaId\":\"F696C839-D545-4E11-8908-FA86DC440462\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.5\",\"versionEndExcluding\":\"4.9.269\",\"matchCriteriaId\":\"7E86BB03-C8D1-4E43-ADC4-64C340941D4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.10\",\"versionEndExcluding\":\"4.14.233\",\"matchCriteriaId\":\"4836AF17-022D-49D0-9A8A-AF66FE8DCEB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.15\",\"versionEndExcluding\":\"4.19.191\",\"matchCriteriaId\":\"5B6E6817-19A8-4C0A-8807-71DA48CF9191\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.20\",\"versionEndExcluding\":\"5.4.120\",\"matchCriteriaId\":\"2BDC71CF-4451-4D53-93E9-61DE7C4E25B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.5\",\"versionEndExcluding\":\"5.10.38\",\"matchCriteriaId\":\"2BB4E5E8-4AAD-475A-A1B9-F287254C7D72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.11\",\"versionEndExcluding\":\"5.11.22\",\"matchCriteriaId\":\"83B53E9A-F426-4C03-9A5F-A931FF79827E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.12\",\"versionEndExcluding\":\"5.12.5\",\"matchCriteriaId\":\"0274929A-B36C-4F4C-AB22-30A0DD6B995B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80E516C0-98A4-4ADE-B69F-66A772E2BAAA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"108A2215-50FB-4074-94CF-C130FA14566D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AFC73CE-ABB9-42D3-9A71-3F5BC5381E0E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6770B6C3-732E-4E22-BF1C-2D2FD610061C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F9C8C20-42EB-4AB5-BD97-212DEB070C43\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32F0B6C0-F930-480D-962B-3F4EFDCC13C7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"803BC414-B250-4E3A-A478-A3881340D6B8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FFF7106-ED78-49BA-9EC5-B889E3685D53\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E63D8B0F-006E-4801-BF9D-1C001BBFB4F9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FEB3337-BFDE-462A-908B-176F92053CEC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"736AEAE9-782B-4F71-9893-DED53367E102\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56409CEC-5A1E-4450-AA42-641E459CC2AF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B06F4839-D16A-4A61-9BB5-55B13F41E47F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0B4AD8A-F172-4558-AEC6-FF424BA2D912\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8497A4C9-8474-4A62-8331-3FE862ED4098\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6543E60C-2FCB-4317-8066-E7256630DF69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EDB6772-7FDB-45FF-8D72-952902A7EE56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEA64107-8025-4DC7-8222-F898ADEC6864\"}]}]}],\"references\":[{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2034342\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://lore.kernel.org/lkml/20210517140244.822185482%40linuxfoundation.org/\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20220602-0007/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujul2022.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2034342\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://lore.kernel.org/lkml/20210517140244.822185482%40linuxfoundation.org/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20220602-0007/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujul2022.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
rhsa-2022_1975
Vulnerability from csaf_redhat
Published
2022-05-10 13:43
Modified
2024-11-15 17:12
Summary
Red Hat Security Advisory: kernel-rt security and bug fix update
Notes
Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)
* kernel: avoid cyclic entity chains due to malformed USB descriptors (CVE-2020-0404)
* kernel: integer overflow in k_ascii() in drivers/tty/vt/keyboard.c (CVE-2020-13974)
* kernel: out-of-bounds read in bpf_skb_change_head() of filter.c due to a use-after-free (CVE-2021-0941)
* kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP() (CVE-2021-3612)
* kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts (CVE-2021-3669)
* kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c (CVE-2021-3743)
* kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd() (CVE-2021-3744)
* kernel: possible use-after-free in bluetooth module (CVE-2021-3752)
* kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks (CVE-2021-3759)
* kernel: DoS in ccp_run_aes_gcm_cmd() function (CVE-2021-3764)
* kernel: sctp: Invalid chunks may be used to remotely remove existing associations (CVE-2021-3772)
* kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients (CVE-2021-3773)
* kernel: possible leak or coruption of data residing on hugetlbfs (CVE-2021-4002)
* kernel: security regression for CVE-2018-13405 (CVE-2021-4037)
* kernel: Buffer overwrite in decode_nfs_fh function (CVE-2021-4157)
* kernel: cgroup: Use open-time creds and namespace for migration perm checks (CVE-2021-4197)
* kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses (CVE-2021-4203)
* kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies (CVE-2021-20322)
* hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715 (CVE-2021-26401)
* kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation (CVE-2021-29154)
* kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c (CVE-2021-37159)
* kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write (CVE-2021-41864)
* kernel: Heap buffer overflow in firedtv driver (CVE-2021-42739)
* kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c (CVE-2021-43389)
* kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device (CVE-2021-43976)
* kernel: use-after-free in the TEE subsystem (CVE-2021-44733)
* kernel: information leak in the IPv6 implementation (CVE-2021-45485)
* kernel: information leak in the IPv4 implementation (CVE-2021-45486)
* hw: cpu: intel: Branch History Injection (BHI) (CVE-2022-0001)
* hw: cpu: intel: Intra-Mode BTI (CVE-2022-0002)
* kernel: Local denial of service in bond_ipsec_add_sa (CVE-2022-0286)
* kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c (CVE-2022-0322)
* kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes (CVE-2022-1011)
* kernel: use-after-free in nouveau kernel module (CVE-2020-27820)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.6 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)\n\n* kernel: avoid cyclic entity chains due to malformed USB descriptors (CVE-2020-0404)\n\n* kernel: integer overflow in k_ascii() in drivers/tty/vt/keyboard.c (CVE-2020-13974)\n\n* kernel: out-of-bounds read in bpf_skb_change_head() of filter.c due to a use-after-free (CVE-2021-0941)\n\n* kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP() (CVE-2021-3612)\n\n* kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts (CVE-2021-3669)\n\n* kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c (CVE-2021-3743)\n\n* kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd() (CVE-2021-3744)\n\n* kernel: possible use-after-free in bluetooth module (CVE-2021-3752)\n\n* kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks (CVE-2021-3759)\n\n* kernel: DoS in ccp_run_aes_gcm_cmd() function (CVE-2021-3764)\n\n* kernel: sctp: Invalid chunks may be used to remotely remove existing associations (CVE-2021-3772)\n\n* kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients (CVE-2021-3773)\n\n* kernel: possible leak or coruption of data residing on hugetlbfs (CVE-2021-4002)\n\n* kernel: security regression for CVE-2018-13405 (CVE-2021-4037)\n\n* kernel: Buffer overwrite in decode_nfs_fh function (CVE-2021-4157)\n\n* kernel: cgroup: Use open-time creds and namespace for migration perm checks (CVE-2021-4197)\n\n* kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses (CVE-2021-4203)\n\n* kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies (CVE-2021-20322)\n\n* hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715 (CVE-2021-26401)\n\n* kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation (CVE-2021-29154)\n\n* kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c (CVE-2021-37159)\n\n* kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write (CVE-2021-41864)\n\n* kernel: Heap buffer overflow in firedtv driver (CVE-2021-42739)\n\n* kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c (CVE-2021-43389)\n\n* kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device (CVE-2021-43976)\n\n* kernel: use-after-free in the TEE subsystem (CVE-2021-44733)\n\n* kernel: information leak in the IPv6 implementation (CVE-2021-45485)\n\n* kernel: information leak in the IPv4 implementation (CVE-2021-45486)\n\n* hw: cpu: intel: Branch History Injection (BHI) (CVE-2022-0001)\n\n* hw: cpu: intel: Intra-Mode BTI (CVE-2022-0002)\n\n* kernel: Local denial of service in bond_ipsec_add_sa (CVE-2022-0286)\n\n* kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c (CVE-2022-0322)\n\n* kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes (CVE-2022-1011)\n\n* kernel: use-after-free in nouveau kernel module (CVE-2020-27820)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.6 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1975", "url": "https://access.redhat.com/errata/RHSA-2022:1975" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.6_release_notes/", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.6_release_notes/" }, { "category": "external", "summary": "1901726", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901726" }, { "category": "external", "summary": "1903578", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903578" }, { "category": "external", "summary": "1905749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905749" }, { "category": "external", "summary": "1919791", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919791" }, { "category": "external", "summary": "1946684", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946684" }, { "category": "external", "summary": "1951739", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951739" }, { "category": "external", "summary": "1974079", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974079" }, { "category": "external", "summary": "1985353", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1985353" }, { "category": "external", "summary": "1986473", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986473" }, { "category": "external", "summary": "1997467", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997467" }, { "category": "external", "summary": "1997961", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997961" }, { "category": "external", "summary": "1999544", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999544" }, { "category": "external", "summary": "1999675", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999675" }, { "category": "external", "summary": "2000627", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000627" }, { "category": "external", "summary": "2000694", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000694" }, { "category": "external", "summary": "2004949", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004949" }, { "category": "external", "summary": "2010463", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010463" }, { "category": "external", "summary": "2013180", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013180" }, { "category": "external", "summary": "2014230", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2014230" }, { "category": "external", "summary": "2016169", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016169" }, { "category": "external", "summary": "2018205", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018205" }, { "category": "external", "summary": "2025003", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025003" }, { "category": "external", "summary": "2025726", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025726" }, { "category": "external", "summary": "2027239", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027239" }, { "category": "external", "summary": "2029923", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923" }, { "category": "external", "summary": "2030747", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030747" }, { "category": "external", "summary": "2034342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034342" }, { "category": "external", "summary": "2035652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035652" }, { "category": "external", "summary": "2036934", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036934" }, { "category": "external", "summary": "2037019", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037019" }, { "category": "external", "summary": "2039911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039911" }, { "category": "external", "summary": "2039914", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039914" }, { "category": "external", "summary": "2042822", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042822" }, { "category": "external", "summary": "2061700", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061700" }, { "category": "external", "summary": "2061712", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061712" }, { "category": "external", "summary": "2061721", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061721" }, { "category": "external", "summary": "2064855", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064855" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1975.json" } ], "title": "Red Hat Security Advisory: kernel-rt security and bug fix update", "tracking": { "current_release_date": "2024-11-15T17:12:25+00:00", "generator": { "date": "2024-11-15T17:12:25+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:1975", "initial_release_date": "2022-05-10T13:43:14+00:00", "revision_history": [ { "date": "2022-05-10T13:43:14+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-05-10T13:43:14+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T17:12:25+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux NFV (v. 8)", "product": { "name": "Red Hat Enterprise Linux NFV (v. 8)", "product_id": "NFV-8.6.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::nfv" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux RT (v. 8)", "product": { "name": "Red Hat Enterprise Linux RT (v. 8)", "product_id": "RT-8.6.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::realtime" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "product": { "name": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "product_id": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-372.9.1.rt7.166.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "product": { "name": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "product_id": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-372.9.1.rt7.166.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "product": { "name": "kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "product_id": "kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-372.9.1.rt7.166.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "product": { "name": "kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "product_id": "kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-372.9.1.rt7.166.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "product": { "name": "kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "product_id": "kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-372.9.1.rt7.166.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "product": { "name": "kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "product_id": "kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-372.9.1.rt7.166.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "product": { "name": "kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "product_id": "kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-372.9.1.rt7.166.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "product": { "name": "kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "product_id": "kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-372.9.1.rt7.166.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "product": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "product_id": "kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-372.9.1.rt7.166.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "product": { "name": "kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "product_id": "kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-372.9.1.rt7.166.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "product": { "name": "kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "product_id": "kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-372.9.1.rt7.166.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "product": { "name": "kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "product_id": "kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-372.9.1.rt7.166.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "product": { "name": "kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "product_id": "kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-372.9.1.rt7.166.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-372.9.1.rt7.166.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "product": { "name": "kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "product_id": "kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-372.9.1.rt7.166.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "product": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-372.9.1.rt7.166.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src as a component of Red Hat Enterprise Linux NFV (v. 8)", "product_id": "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src" }, "product_reference": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "relates_to_product_reference": "NFV-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)", "product_id": "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64" }, "product_reference": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "relates_to_product_reference": "NFV-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)", "product_id": "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64" }, "product_reference": "kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "relates_to_product_reference": "NFV-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)", "product_id": "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64" }, "product_reference": "kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "relates_to_product_reference": "NFV-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)", "product_id": "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64" }, "product_reference": "kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "relates_to_product_reference": "NFV-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)", "product_id": "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "relates_to_product_reference": "NFV-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)", "product_id": "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "relates_to_product_reference": "NFV-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)", "product_id": "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "relates_to_product_reference": "NFV-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)", "product_id": "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "relates_to_product_reference": "NFV-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)", "product_id": "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "relates_to_product_reference": "NFV-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)", "product_id": "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "relates_to_product_reference": "NFV-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)", "product_id": "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "relates_to_product_reference": "NFV-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)", "product_id": "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64" }, "product_reference": "kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "relates_to_product_reference": "NFV-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)", "product_id": "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64" }, "product_reference": "kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "relates_to_product_reference": "NFV-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)", "product_id": "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64" }, "product_reference": "kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "relates_to_product_reference": "NFV-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)", "product_id": "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "relates_to_product_reference": "NFV-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src as a component of Red Hat Enterprise Linux RT (v. 8)", "product_id": "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src" }, "product_reference": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "relates_to_product_reference": "RT-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)", "product_id": "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64" }, "product_reference": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "relates_to_product_reference": "RT-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)", "product_id": "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64" }, "product_reference": "kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "relates_to_product_reference": "RT-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)", "product_id": "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64" }, "product_reference": "kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "relates_to_product_reference": "RT-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)", "product_id": "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64" }, "product_reference": "kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "relates_to_product_reference": "RT-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)", "product_id": "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "relates_to_product_reference": "RT-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)", "product_id": "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "relates_to_product_reference": "RT-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)", "product_id": "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "relates_to_product_reference": "RT-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)", "product_id": "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "relates_to_product_reference": "RT-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)", "product_id": "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "relates_to_product_reference": "RT-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)", "product_id": "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "relates_to_product_reference": "RT-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)", "product_id": "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "relates_to_product_reference": "RT-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)", "product_id": "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64" }, "product_reference": "kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "relates_to_product_reference": "RT-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)", "product_id": "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64" }, "product_reference": "kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "relates_to_product_reference": "RT-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)", "product_id": "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64" }, "product_reference": "kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "relates_to_product_reference": "RT-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)", "product_id": "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "relates_to_product_reference": "RT-8.6.0.GA" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0404", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2021-01-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1919791" } ], "notes": [ { "category": "description", "text": "A flaw linked list corruption in the Linux kernel for USB Video Class driver functionality was found in the way user connects web camera to the USB port. A local user could use this flaw to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: avoid cyclic entity chains due to malformed USB descriptors", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0404" }, { "category": "external", "summary": "RHBZ#1919791", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919791" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0404", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0404" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0404", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0404" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=68035c80e129c4cfec659aac4180354530b26527", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=68035c80e129c4cfec659aac4180354530b26527" } ], "release_date": "2021-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1975" }, { "category": "workaround", "details": "To mitigate this issue, prevent the module uvcvideo from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: avoid cyclic entity chains due to malformed USB descriptors" }, { "cve": "CVE-2020-13974", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2021-01-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2016169" } ], "notes": [ { "category": "description", "text": "A flaw integer overflow in the Linux kernel\u0027s virtual terminal keyboard driver was found in the way the user sends some specific keyboard code multiple times. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: integer overflow in k_ascii() in drivers/tty/vt/keyboard.c", "title": "Vulnerability summary" }, { "category": "other", "text": "No code depends on this integer overflow so it is unlikely that the vulnerability can be used for anything apart from crashing the system. The impact has been reduced to Moderate from Important based on this analysis.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-13974" }, { "category": "external", "summary": "RHBZ#2016169", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016169" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-13974", "url": "https://www.cve.org/CVERecord?id=CVE-2020-13974" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13974", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13974" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b86dab054059b970111b5516ae548efaae5b3aae", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b86dab054059b970111b5516ae548efaae5b3aae" } ], "release_date": "2020-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1975" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: integer overflow in k_ascii() in drivers/tty/vt/keyboard.c" }, { "acknowledgments": [ { "names": [ "Jeremy Cline" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2020-27820", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-11-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1901726" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Linux kernel, where a use-after-frees in nouveau\u0027s postclose() handler could happen if removing device (that is not common to remove video card physically without power-off, but same happens if \"unbind\" the driver).", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in nouveau kernel module", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having a Low impact because the issue can only be triggered by an privileged local user (or user with physical access) as the issue only happens during unbinding the driver or removing the device.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-27820" }, { "category": "external", "summary": "RHBZ#1901726", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901726" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-27820", "url": "https://www.cve.org/CVERecord?id=CVE-2020-27820" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27820", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27820" }, { "category": "external", "summary": "https://lore.kernel.org/dri-devel/20201103194912.184413-2-jcline@redhat.com/", "url": "https://lore.kernel.org/dri-devel/20201103194912.184413-2-jcline@redhat.com/" }, { "category": "external", "summary": "https://lore.kernel.org/dri-devel/20201103194912.184413-3-jcline@redhat.com/", "url": "https://lore.kernel.org/dri-devel/20201103194912.184413-3-jcline@redhat.com/" }, { "category": "external", "summary": "https://lore.kernel.org/dri-devel/20201103194912.184413-4-jcline@redhat.com/", "url": "https://lore.kernel.org/dri-devel/20201103194912.184413-4-jcline@redhat.com/" } ], "release_date": "2020-11-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1975" }, { "category": "workaround", "details": "To mitigate this issue, prevent the module nouveau from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: use-after-free in nouveau kernel module" }, { "cve": "CVE-2021-0941", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2021-10-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2018205" } ], "notes": [ { "category": "description", "text": "An out-of-bounds (OOB) memory access flaw was found in net/core/filter.c in __bpf_skb_max_len in the Linux kernel. A missing sanity check to the current MTU check may allow a local attacker with special user privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: out-of-bounds read in bpf_skb_change_head() of filter.c due to a use-after-free", "title": "Vulnerability summary" }, { "category": "other", "text": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-0941" }, { "category": "external", "summary": "RHBZ#2018205", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018205" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-0941", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0941" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0941", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0941" }, { "category": "external", "summary": "https://android.googlesource.com/kernel/common/+/6306c1189e77a513bf02720450bb43bd4ba5d8ae%5E%21/#F0", "url": "https://android.googlesource.com/kernel/common/+/6306c1189e77a513bf02720450bb43bd4ba5d8ae%5E%21/#F0" } ], "release_date": "2021-02-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1975" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: out-of-bounds read in bpf_skb_change_head() of filter.c due to a use-after-free" }, { "acknowledgments": [ { "names": [ "Murray McAllister" ] } ], "cve": "CVE-2021-3612", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2021-06-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1974079" } ], "notes": [ { "category": "description", "text": "An out-of-bounds memory write flaw was found in the Linux kernel\u2019s joystick devices subsystem, in the way the user calls ioctl JSIOCSBTNMAP. This flaw allows a local user to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP()", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having a Moderate impact because for the Red Hat Enterprise Linux the patch that made it possible writing memory out of bounds not applied yet, but still before that patch possible read out of bounds. Both in the default configuration of Red Hat Enterprise Linux the joysticks devices driver is disabled, so only privileged local user can enable it.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3612" }, { "category": "external", "summary": "RHBZ#1974079", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974079" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3612", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3612" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3612", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3612" }, { "category": "external", "summary": "https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/", "url": "https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/" } ], "release_date": "2021-06-20T12:28:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1975" }, { "category": "workaround", "details": "To mitigate this issue, prevent the module joydev from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP()" }, { "cve": "CVE-2021-3669", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2021-07-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986473" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. Measuring usage of the shared memory does not scale with large shared memory segment counts which could lead to resource exhaustion and DoS.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3669" }, { "category": "external", "summary": "RHBZ#1986473", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986473" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3669", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3669" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3669", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3669" } ], "release_date": "2021-08-02T06:02:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1975" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts" }, { "acknowledgments": [ { "names": [ "Active Defense Lab" ], "organization": "Venustech" } ], "cve": "CVE-2021-3743", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2021-08-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1997961" } ], "notes": [ { "category": "description", "text": "An out-of-bounds (OOB) memory read flaw was found in the Qualcomm IPC router protocol in the Linux kernel. A missing sanity check allows a local attacker to gain access to out-of-bounds memory, leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c", "title": "Vulnerability summary" }, { "category": "other", "text": "There was no shipped kernel version that was seen affected by this problem. These files are not built in our source code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3743" }, { "category": "external", "summary": "RHBZ#1997961", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997961" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3743", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3743" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3743", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3743" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=7e78c597c3eb", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=7e78c597c3eb" }, { "category": "external", "summary": "https://lists.openwall.net/netdev/2021/08/17/124", "url": "https://lists.openwall.net/netdev/2021/08/17/124" } ], "release_date": "2021-08-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1975" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c" }, { "cve": "CVE-2021-3744", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2021-08-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2000627" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. A memory leak in the ccp-ops crypto driver can allow attackers to cause a denial of service. This vulnerability is similar with the older CVE-2019-18808. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3744" }, { "category": "external", "summary": "RHBZ#2000627", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000627" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3744", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3744" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3744", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3744" }, { "category": "external", "summary": "https://kernel.googlesource.com/pub/scm/linux/kernel/git/herbert/crypto-2.6/+/505d9dcb0f7ddf9d075e729523a33d38642ae680%5E%21/#F0", "url": "https://kernel.googlesource.com/pub/scm/linux/kernel/git/herbert/crypto-2.6/+/505d9dcb0f7ddf9d075e729523a33d38642ae680%5E%21/#F0" } ], "release_date": "2021-08-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1975" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation baser or stability.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()" }, { "acknowledgments": [ { "names": [ "Likang Luo" ], "organization": "NSFOCUS Security Team" } ], "cve": "CVE-2021-3752", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2021-08-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1999544" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the Linux kernel\u2019s Bluetooth subsystem in the way user calls connect to the socket and disconnect simultaneously due to a race condition. This flaw allows a user to crash the system or escalate their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: possible use-after-free in bluetooth module", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Moderate impact because Only local users with privileges to access the sock_dgram Bluetooth socket can trigger this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3752" }, { "category": "external", "summary": "RHBZ#1999544", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999544" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3752", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3752" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3752", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3752" }, { "category": "external", "summary": "https://lore.kernel.org/lkml/20211115165435.133245729@linuxfoundation.org/", "url": "https://lore.kernel.org/lkml/20211115165435.133245729@linuxfoundation.org/" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2021/09/15/4", "url": "https://www.openwall.com/lists/oss-security/2021/09/15/4" } ], "release_date": "2021-09-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1975" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation baser or stability. The possible solution is to disable Bluetooth completely: https://access.redhat.com/solutions/2682931", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: possible use-after-free in bluetooth module" }, { "acknowledgments": [ { "names": [ "Yutian Yang" ], "organization": "Zhejiang University" } ], "cve": "CVE-2021-3759", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2021-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1999675" } ], "notes": [ { "category": "description", "text": "A memory overflow vulnerability was found in the Linux kernel\u2019s ipc functionality of the memcg subsystem, in the way a user calls the semget function multiple times, creating semaphores. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3759" }, { "category": "external", "summary": "RHBZ#1999675", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999675" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3759", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3759" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3759", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3759" }, { "category": "external", "summary": "https://lore.kernel.org/linux-mm/1626333284-1404-1-git-send-email-nglaive@gmail.com/", "url": "https://lore.kernel.org/linux-mm/1626333284-1404-1-git-send-email-nglaive@gmail.com/" } ], "release_date": "2021-07-15T09:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1975" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks" }, { "cve": "CVE-2021-3764", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2021-08-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1997467" } ], "notes": [ { "category": "description", "text": "A memory leak flaw was found in the Linux kernel\u0027s ccp_run_aes_gcm_cmd() function that allows an attacker to cause a denial of service. The vulnerability is similar to the older CVE-2019-18808. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: DoS in ccp_run_aes_gcm_cmd() function", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3764" }, { "category": "external", "summary": "RHBZ#1997467", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997467" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3764", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3764" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3764", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3764" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=36cf515b9bbe", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=36cf515b9bbe" } ], "release_date": "2021-08-20T09:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1975" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: DoS in ccp_run_aes_gcm_cmd() function" }, { "cve": "CVE-2021-3772", "cwe": { "id": "CWE-354", "name": "Improper Validation of Integrity Check Value" }, "discovery_date": "2021-08-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2000694" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux SCTP stack. A blind attacker may be able to kill an existing SCTP association through invalid chunks if the attacker knows the IP-addresses and port numbers being used and the attacker can send packets with spoofed IP addresses.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: sctp: Invalid chunks may be used to remotely remove existing associations", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3772" }, { "category": "external", "summary": "RHBZ#2000694", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000694" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3772", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3772" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3772", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3772" } ], "release_date": "2021-09-08T06:38:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1975" }, { "category": "workaround", "details": "As the SCTP module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\nif\n# echo \"install sctp /bin/true\" \u003e\u003e /etc/modprobe.d/disable-sctp.conf\n\nThe system will need to be restarted if the SCTP modules are loaded. In most circumstances, the SCTP kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: sctp: Invalid chunks may be used to remotely remove existing associations" }, { "cve": "CVE-2021-3773", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-09-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2004949" } ], "notes": [ { "category": "description", "text": "A flaw in netfilter could allow a network-connected attacker to infer openvpn connection endpoint information for further use in traditional network attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3773" }, { "category": "external", "summary": "RHBZ#2004949", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004949" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3773", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3773" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3773", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3773" } ], "release_date": "2021-09-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1975" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients" }, { "acknowledgments": [ { "names": [ "elijahbai, jitxie, huntazhang." ] } ], "cve": "CVE-2021-3923", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-11-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2019643" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s implementation of RDMA over infiniband. An attacker with a privileged local account can leak kernel stack information when issuing commands to the /dev/infiniband/rdma_cm device node. While this access is unlikely to leak sensitive user information, it can be further used to defeat existing kernel protection mechanisms.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: stack information leak in infiniband RDMA", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3923" }, { "category": "external", "summary": "RHBZ#2019643", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019643" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3923", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3923" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3923", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3923" } ], "release_date": "2021-12-01T13:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1975" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: stack information leak in infiniband RDMA" }, { "cve": "CVE-2021-4002", "cwe": { "id": "CWE-459", "name": "Incomplete Cleanup" }, "discovery_date": "2021-11-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2025726" } ], "notes": [ { "category": "description", "text": "A memory leak flaw in the Linux kernel\u0027s hugetlbfs memory usage was found in the way the user maps some regions of memory twice using shmget() which are aligned to PUD alignment with the fault of some of the memory pages. A local user could use this flaw to get unauthorized access to some data.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: possible leak or coruption of data residing on hugetlbfs", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-4002" }, { "category": "external", "summary": "RHBZ#2025726", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025726" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4002", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4002" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4002", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4002" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13e4ad2ce8df6e058ef482a31fdd81c725b0f7ea", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13e4ad2ce8df6e058ef482a31fdd81c725b0f7ea" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4a118f2eead1d6c49e00765de89878288d4b890", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4a118f2eead1d6c49e00765de89878288d4b890" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2021/11/25/1", "url": "https://www.openwall.com/lists/oss-security/2021/11/25/1" } ], "release_date": "2021-11-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1975" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: possible leak or coruption of data residing on hugetlbfs" }, { "cve": "CVE-2021-4037", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2021-11-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2027239" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the fs/inode.c:inode_init_owner() function logic of the LInux kernel that allows local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set, in a scenario where a directory is SGID and belongs to a certain group and is writable by a user who is not a member of this group. This can lead to excessive permissions granted in case when they should not. This vulnerability is similar to the previous CVE-2018-13405 and adds the missed fix for the XFS.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: security regression for CVE-2018-13405", "title": "Vulnerability summary" }, { "category": "other", "text": "The Impact is Moderate, because if no configuration problems with the system, then unlikely higher impact than unauthorized read access.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-4037" }, { "category": "external", "summary": "RHBZ#2027239", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027239" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4037", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4037" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4037", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4037" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=01ea173e103e", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=01ea173e103e" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0fa3ecd87848", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0fa3ecd87848" } ], "release_date": "2021-09-16T09:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1975" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: security regression for CVE-2018-13405" }, { "cve": "CVE-2021-4083", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2021-12-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2029923" } ], "notes": [ { "category": "description", "text": "A read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: fget: check that the fd still exists after getting a ref to it", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-4083" }, { "category": "external", "summary": "RHBZ#2029923", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4083", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4083" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9" } ], "release_date": "2021-12-03T08:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1975" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: fget: check that the fd still exists after getting a ref to it" }, { "cve": "CVE-2021-4093", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-11-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2028584" } ], "notes": [ { "category": "description", "text": "A flaw was found in the KVM\u0027s AMD code for supporting the Secure Encrypted Virtualization-Encrypted State (SEV-ES). A KVM guest using SEV-ES can trigger out-of-bounds reads and writes in the host kernel via a malicious VMGEXIT for a string I/O instruction (for example, outs or ins) using the exit reason SVM_EXIT_IOIO. This issue results in a crash of the entire system or a potential guest-to-host escape scenario.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: KVM: SVM: out-of-bounds read/write in sev_es_string_io", "title": "Vulnerability summary" }, { "category": "other", "text": "AMD Secure Encrypted Virtualization (SEV) is currently provided as a Technology Preview in RHEL and, therefore, unsupported for production use. For additional details please see https://access.redhat.com/articles/4491591 and https://access.redhat.com/support/offerings/techpreview.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-4093" }, { "category": "external", "summary": "RHBZ#2028584", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2028584" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4093", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4093" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4093", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4093" }, { "category": "external", "summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2222", "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2222" } ], "release_date": "2021-11-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1975" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: KVM: SVM: out-of-bounds read/write in sev_es_string_io" }, { "cve": "CVE-2021-4157", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2021-12-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034342" } ], "notes": [ { "category": "description", "text": "An out of memory bounds write flaw (1 or 2 bytes of memory) in the Linux kernel NFS subsystem was found in the way users use mirroring (replication of files with NFS). A user, having access to the NFS mount, could potentially use this flaw to crash the system or escalate privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Buffer overwrite in decode_nfs_fh function", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-4157" }, { "category": "external", "summary": "RHBZ#2034342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034342" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4157", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4157" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4157", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4157" }, { "category": "external", "summary": "https://lore.kernel.org/lkml/20210517140244.822185482@linuxfoundation.org/", "url": "https://lore.kernel.org/lkml/20210517140244.822185482@linuxfoundation.org/" } ], "release_date": "2021-05-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1975" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Buffer overwrite in decode_nfs_fh function" }, { "cve": "CVE-2021-4197", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2021-12-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2035652" } ], "notes": [ { "category": "description", "text": "An unprivileged write to the file handler flaw in the Linux kernel\u0027s control groups and namespaces subsystem was found in the way users have access to some less privileged process that are controlled by cgroups and have higher privileged parent process. It is actually both for cgroup2 and cgroup1 versions of control groups. A local user could use this flaw to crash the system or escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: cgroup: Use open-time creds and namespace for migration perm checks", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-4197" }, { "category": "external", "summary": "RHBZ#2035652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4197", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4197" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4197", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4197" }, { "category": "external", "summary": "https://lore.kernel.org/lkml/20211209214707.805617-1-tj@kernel.org/T/", "url": "https://lore.kernel.org/lkml/20211209214707.805617-1-tj@kernel.org/T/" } ], "release_date": "2021-09-12T09:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1975" }, { "category": "workaround", "details": "The mitigation not known. However, for the default configuration of the Red Hat Enterprise Linux it is not possible to trigger this vulnerability: if control groups (cgroups) not being used or being used with the default configuration or being used some other configuration where for example similar privileges for all processes (both for parent and for child processes), then no way to trigger this vulnerability.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: cgroup: Use open-time creds and namespace for migration perm checks" }, { "cve": "CVE-2021-4203", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-01-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2036934" } ], "notes": [ { "category": "description", "text": "A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()) in the Linux kernel. In this flaw, an attacker with a user privileges may crash the system or leak internal kernel information.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-4203" }, { "category": "external", "summary": "RHBZ#2036934", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036934" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4203", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4203" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4203", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4203" }, { "category": "external", "summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2230\u0026can=7\u0026q=modified-after%3Atoday-30\u0026sort=-modified\u0026colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary%20Modified%20Cve\u0026cells=tiles\u0026redir=1", "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2230\u0026can=7\u0026q=modified-after%3Atoday-30\u0026sort=-modified\u0026colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary%20Modified%20Cve\u0026cells=tiles\u0026redir=1" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=35306eb23814", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=35306eb23814" }, { "category": "external", "summary": "https://lore.kernel.org/netdev/20210929225750.2548112-1-eric.dumazet@gmail.com/T/", "url": "https://lore.kernel.org/netdev/20210929225750.2548112-1-eric.dumazet@gmail.com/T/" } ], "release_date": "2021-09-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1975" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "products": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses" }, { "acknowledgments": [ { "names": [ "Keyu Man, Xin\u0027an Zhou and Zhiyun Qian" ], "organization": "University of California, Riverside" } ], "cve": "CVE-2021-20322", "cwe": { "id": "CWE-330", "name": "Use of Insufficiently Random Values" }, "discovery_date": "2021-09-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2014230" } ], "notes": [ { "category": "description", "text": "A flaw in the processing of received ICMP errors (ICMP fragment needed and ICMP redirect) in the Linux kernel functionality was found to allow the ability to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypass the source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software that relies on UDP source port randomization are indirectly affected as well.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Moderate impact because of the attack scenario limitation. It is possible to harm the networking services only, but not for the overall system under attack, and impossible to get access to this remote system under attack.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-20322" }, { "category": "external", "summary": "RHBZ#2014230", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2014230" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-20322", "url": "https://www.cve.org/CVERecord?id=CVE-2021-20322" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20322", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20322" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6\u0026id=4785305c05b25a242e5314cc821f54ade4c18810", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6\u0026id=4785305c05b25a242e5314cc821f54ade4c18810" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6\u0026id=6457378fe796815c973f631a1904e147d6ee33b1", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6\u0026id=6457378fe796815c973f631a1904e147d6ee33b1" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/route.c?h=v5.15-rc6\u0026id=67d6d681e15b578c1725bad8ad079e05d1c48a8e", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/route.c?h=v5.15-rc6\u0026id=67d6d681e15b578c1725bad8ad079e05d1c48a8e" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv6/route.c?h=v5.15-rc6\u0026id=a00df2caffed3883c341d5685f830434312e4a43", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv6/route.c?h=v5.15-rc6\u0026id=a00df2caffed3883c341d5685f830434312e4a43" } ], "release_date": "2021-08-26T08:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1975" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies" }, { "acknowledgments": [ { "names": [ "AMD" ] } ], "cve": "CVE-2021-26401", "discovery_date": "2022-03-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2061700" } ], "notes": [ { "category": "description", "text": "A flaw was found in hw. The speculative execution window of AMD LFENCE/JMP mitigation (MITIGATION V2-2) may be large enough to be exploited on AMD CPUs.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-26401" }, { "category": "external", "summary": "RHBZ#2061700", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061700" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-26401", "url": "https://www.cve.org/CVERecord?id=CVE-2021-26401" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-26401", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-26401" }, { "category": "external", "summary": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1036", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1036" } ], "release_date": "2022-03-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1975" }, { "category": "workaround", "details": "AMD recommends mitigation that uses generic retpoline.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715" }, { "cve": "CVE-2021-29154", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2021-04-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1946684" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernels eBPF implementation. By default, accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN. A local user with the ability to insert eBPF instructions can abuse a flaw in eBPF to corrupt memory. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having Moderate impact as eBPF requires a privileged user on Red Hat Enterprise Linux to correctly load eBPF instructions that can be exploited.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-29154" }, { "category": "external", "summary": "RHBZ#1946684", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946684" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-29154", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29154" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29154", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29154" } ], "release_date": "2021-04-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1975" }, { "category": "workaround", "details": "This issue does not affect most systems by default. An administrator would need to have enabled the BPF JIT to be affected.\n\nIt can be disabled immediately with the command:\n\n# echo 0 \u003e /proc/sys/net/core/bpf_jit_enable\n\nOr it can be disabled for all subsequent boots of the system by setting a value in /etc/sysctl.d/44-bpf-jit-disable\n\n## start file ##\n\nnet.core.bpf_jit_enable=0\n\n## end file ##", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation" }, { "cve": "CVE-2021-37159", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-07-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1985353" } ], "notes": [ { "category": "description", "text": "A flaw use-after-free in the Linux kernel USB High Speed Mobile Devices functionality was found in the way user detaches USB device. A local user could use this flaw to crash the system or escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-37159" }, { "category": "external", "summary": "RHBZ#1985353", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1985353" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-37159", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37159" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37159", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37159" }, { "category": "external", "summary": "https://www.spinics.net/lists/linux-usb/msg202228.html", "url": "https://www.spinics.net/lists/linux-usb/msg202228.html" } ], "release_date": "2020-10-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1975" }, { "category": "workaround", "details": "To mitigate this issue, prevent the module hso from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c" }, { "cve": "CVE-2021-41864", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2010463" } ], "notes": [ { "category": "description", "text": "An out-of-bounds (OOB) memory write flaw was found in prealloc_elems_and_freelist in kernel/bpf/stackmap.c in the bpf in the Linux kernel. In this flaw, the multiplication to calculate the size could lead to an integer overflow which could allow a local attacker, with a special user privilege, to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write", "title": "Vulnerability summary" }, { "category": "other", "text": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-41864" }, { "category": "external", "summary": "RHBZ#2010463", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010463" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-41864", "url": "https://www.cve.org/CVERecord?id=CVE-2021-41864" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-41864", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41864" }, { "category": "external", "summary": "https://github.com/torvalds/linux/commit/30e29a9a2bc6a4888335a6ede968b75cd329657a", "url": "https://github.com/torvalds/linux/commit/30e29a9a2bc6a4888335a6ede968b75cd329657a" } ], "release_date": "2021-09-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1975" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write" }, { "cve": "CVE-2021-42739", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2021-04-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1951739" } ], "notes": [ { "category": "description", "text": "A heap-based buffer overflow flaw was found in the Linux kernel FireDTV media card driver, where the user calls the CA_SEND_MSG ioctl. This flaw allows a local user of the host machine to crash the system or escalate privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Heap buffer overflow in firedtv driver", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-42739" }, { "category": "external", "summary": "RHBZ#1951739", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951739" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-42739", "url": "https://www.cve.org/CVERecord?id=CVE-2021-42739" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-42739", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-42739" }, { "category": "external", "summary": "https://lore.kernel.org/linux-media/YHaulytonFcW+lyZ@mwanda/", "url": "https://lore.kernel.org/linux-media/YHaulytonFcW+lyZ@mwanda/" } ], "release_date": "2021-04-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1975" }, { "category": "workaround", "details": "To mitigate this issue, prevent the module firedtv from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Heap buffer overflow in firedtv driver" }, { "acknowledgments": [ { "names": [ "Active Defense Lab" ], "organization": "Venustech" } ], "cve": "CVE-2021-43389", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2021-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2013180" } ], "notes": [ { "category": "description", "text": "An improper validation of an array index and out of bounds memory read in the Linux kernel\u0027s Integrated Services Digital Network (ISDN) functionality was found in the way users call ioctl CMTPCONNADD. A local user could use this flaw to crash the system or starve the resources causing denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-43389" }, { "category": "external", "summary": "RHBZ#2013180", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013180" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-43389", "url": "https://www.cve.org/CVERecord?id=CVE-2021-43389" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43389", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43389" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d" }, { "category": "external", "summary": "https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA@mail.gmail.com/", "url": "https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA@mail.gmail.com/" } ], "release_date": "2021-09-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1975" }, { "category": "workaround", "details": "To mitigate this issue, prevent the module isdn from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c" }, { "cve": "CVE-2021-43976", "cwe": { "id": "CWE-459", "name": "Incomplete Cleanup" }, "discovery_date": "2021-11-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2025003" } ], "notes": [ { "category": "description", "text": "A denial of service flaw was found in mwifiex_usb_recv in drivers/net/wireless/marvell/mwifiex/usb.c in the usb subsystem of the Linux kernel. This is due to a missing clean-up for a malfunctioning usb device with an unknown recv_type.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-43976" }, { "category": "external", "summary": "RHBZ#2025003", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025003" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-43976", "url": "https://www.cve.org/CVERecord?id=CVE-2021-43976" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43976", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43976" }, { "category": "external", "summary": "https://patchwork.kernel.org/project/linux-wireless/patch/YX4CqjfRcTa6bVL+@Zekuns-MBP-16.fios-router.home/", "url": "https://patchwork.kernel.org/project/linux-wireless/patch/YX4CqjfRcTa6bVL+@Zekuns-MBP-16.fios-router.home/" } ], "release_date": "2021-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1975" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device" }, { "acknowledgments": [ { "names": [ "Patrik Lantz" ], "organization": "axis.com" } ], "cve": "CVE-2021-44733", "cwe": { "id": "CWE-908", "name": "Use of Uninitialized Resource" }, "discovery_date": "2021-12-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2030747" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw in the Linux kernel TEE (Trusted Execution Environment) subsystem was found in the way user calls ioctl TEE_IOC_OPEN_SESSION or TEE_IOC_INVOKE. A local user could use this flaw to crash the system or escalate their privileges on the system. If the Linux system non configured with the CONFIG_PREEMPT option or CONFIG_CPU_SW_DOMAIN_PAN option enabled, then it is unlikely that a user can trigger this issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in the TEE subsystem", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-44733" }, { "category": "external", "summary": "RHBZ#2030747", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030747" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-44733", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44733" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44733", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44733" }, { "category": "external", "summary": "https://lore.kernel.org/lkml/20211214123540.1789434-1-jens.wiklander@linaro.org/", "url": "https://lore.kernel.org/lkml/20211214123540.1789434-1-jens.wiklander@linaro.org/" } ], "release_date": "2021-12-14T12:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1975" }, { "category": "workaround", "details": "To mitigate this issue, prevent the modules tee, trusted_tee from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free in the TEE subsystem" }, { "cve": "CVE-2021-45485", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "discovery_date": "2021-12-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2039911" } ], "notes": [ { "category": "description", "text": "An information leak flaw was found in the Linux kernel\u2019s IPv6 implementation in the __ipv6_select_ident in net/ipv6/output_core.c function. The use of a small hash table in IP ID generation allows a remote attacker to reveal sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: information leak in the IPv6 implementation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-45485" }, { "category": "external", "summary": "RHBZ#2039911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039911" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-45485", "url": "https://www.cve.org/CVERecord?id=CVE-2021-45485" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45485", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45485" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=62f20e068ccc50d6ab66fdb72ba90da2b9418c99", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=62f20e068ccc50d6ab66fdb72ba90da2b9418c99" }, { "category": "external", "summary": "https://lore.kernel.org/all/20210529110746.6796-1-w@1wt.eu/", "url": "https://lore.kernel.org/all/20210529110746.6796-1-w@1wt.eu/" } ], "release_date": "2021-05-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1975" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: information leak in the IPv6 implementation" }, { "cve": "CVE-2021-45486", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-12-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2039914" } ], "notes": [ { "category": "description", "text": "An information leak flaw was found in the Linux kernel\u2019s IPv4 implementation in the ip_rt_init in net/ipv4/route.c function. The use of a small hash table in IP ID generation allows a remote attacker to reveal sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: information leak in the IPv4 implementation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-45486" }, { "category": "external", "summary": "RHBZ#2039914", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039914" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-45486", "url": "https://www.cve.org/CVERecord?id=CVE-2021-45486" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45486", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45486" }, { "category": "external", "summary": "https://arxiv.org/pdf/2112.09604.pdf", "url": "https://arxiv.org/pdf/2112.09604.pdf" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/net/ipv4/route.c?id=aa6dd211e4b1dde9d5dc25d699d35f789ae7eeba", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/net/ipv4/route.c?id=aa6dd211e4b1dde9d5dc25d699d35f789ae7eeba" } ], "release_date": "2021-03-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1975" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: information leak in the IPv4 implementation" }, { "cve": "CVE-2021-47435", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-05-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2282879" } ], "notes": [ { "category": "description", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm: fix mempool NULL pointer race when completing IO\n\ndm_io_dec_pending() calls end_io_acct() first and will then dec md\nin-flight pending count. But if a task is swapping DM table at same\ntime this can result in a crash due to mempool-\u003eelements being NULL:\n\ntask1 task2\ndo_resume\n -\u003edo_suspend\n -\u003edm_wait_for_completion\n bio_endio\n\t\t\t\t -\u003eclone_endio\n\t\t\t\t -\u003edm_io_dec_pending\n\t\t\t\t -\u003eend_io_acct\n\t\t\t\t -\u003ewakeup task1\n -\u003edm_swap_table\n -\u003e__bind\n -\u003e__bind_mempools\n -\u003ebioset_exit\n -\u003emempool_exit\n -\u003efree_io\n\n[ 67.330330] Unable to handle kernel NULL pointer dereference at\nvirtual address 0000000000000000\n......\n[ 67.330494] pstate: 80400085 (Nzcv daIf +PAN -UAO)\n[ 67.330510] pc : mempool_free+0x70/0xa0\n[ 67.330515] lr : mempool_free+0x4c/0xa0\n[ 67.330520] sp : ffffff8008013b20\n[ 67.330524] x29: ffffff8008013b20 x28: 0000000000000004\n[ 67.330530] x27: ffffffa8c2ff40a0 x26: 00000000ffff1cc8\n[ 67.330535] x25: 0000000000000000 x24: ffffffdada34c800\n[ 67.330541] x23: 0000000000000000 x22: ffffffdada34c800\n[ 67.330547] x21: 00000000ffff1cc8 x20: ffffffd9a1304d80\n[ 67.330552] x19: ffffffdada34c970 x18: 000000b312625d9c\n[ 67.330558] x17: 00000000002dcfbf x16: 00000000000006dd\n[ 67.330563] x15: 000000000093b41e x14: 0000000000000010\n[ 67.330569] x13: 0000000000007f7a x12: 0000000034155555\n[ 67.330574] x11: 0000000000000001 x10: 0000000000000001\n[ 67.330579] x9 : 0000000000000000 x8 : 0000000000000000\n[ 67.330585] x7 : 0000000000000000 x6 : ffffff80148b5c1a\n[ 67.330590] x5 : ffffff8008013ae0 x4 : 0000000000000001\n[ 67.330596] x3 : ffffff80080139c8 x2 : ffffff801083bab8\n[ 67.330601] x1 : 0000000000000000 x0 : ffffffdada34c970\n[ 67.330609] Call trace:\n[ 67.330616] mempool_free+0x70/0xa0\n[ 67.330627] bio_put+0xf8/0x110\n[ 67.330638] dec_pending+0x13c/0x230\n[ 67.330644] clone_endio+0x90/0x180\n[ 67.330649] bio_endio+0x198/0x1b8\n[ 67.330655] dec_pending+0x190/0x230\n[ 67.330660] clone_endio+0x90/0x180\n[ 67.330665] bio_endio+0x198/0x1b8\n[ 67.330673] blk_update_request+0x214/0x428\n[ 67.330683] scsi_end_request+0x2c/0x300\n[ 67.330688] scsi_io_completion+0xa0/0x710\n[ 67.330695] scsi_finish_command+0xd8/0x110\n[ 67.330700] scsi_softirq_done+0x114/0x148\n[ 67.330708] blk_done_softirq+0x74/0xd0\n[ 67.330716] __do_softirq+0x18c/0x374\n[ 67.330724] irq_exit+0xb4/0xb8\n[ 67.330732] __handle_domain_irq+0x84/0xc0\n[ 67.330737] gic_handle_irq+0x148/0x1b0\n[ 67.330744] el1_irq+0xe8/0x190\n[ 67.330753] lpm_cpuidle_enter+0x4f8/0x538\n[ 67.330759] cpuidle_enter_state+0x1fc/0x398\n[ 67.330764] cpuidle_enter+0x18/0x20\n[ 67.330772] do_idle+0x1b4/0x290\n[ 67.330778] cpu_startup_entry+0x20/0x28\n[ 67.330786] secondary_start_kernel+0x160/0x170\n\nFix this by:\n1) Establishing pointers to \u0027struct dm_io\u0027 members in\ndm_io_dec_pending() so that they may be passed into end_io_acct()\n_after_ free_io() is called.\n2) Moving end_io_acct() after free_io().", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: dm: fix mempool NULL pointer race when completing IO", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-47435" }, { "category": "external", "summary": "RHBZ#2282879", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282879" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-47435", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47435" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47435", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47435" } ], "release_date": "2024-05-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1975" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: dm: fix mempool NULL pointer race when completing IO" }, { "cve": "CVE-2021-47544", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-05-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2283406" } ], "notes": [ { "category": "description", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: fix page frag corruption on page fault\n\nSteffen reported a TCP stream corruption for HTTP requests\nserved by the apache web-server using a cifs mount-point\nand memory mapping the relevant file.\n\nThe root cause is quite similar to the one addressed by\ncommit 20eb4f29b602 (\"net: fix sk_page_frag() recursion from\nmemory reclaim\"). Here the nested access to the task page frag\nis caused by a page fault on the (mmapped) user-space memory\nbuffer coming from the cifs file.\n\nThe page fault handler performs an smb transaction on a different\nsocket, inside the same process context. Since sk-\u003esk_allaction\nfor such socket does not prevent the usage for the task_frag,\nthe nested allocation modify \"under the hood\" the page frag\nin use by the outer sendmsg call, corrupting the stream.\n\nThe overall relevant stack trace looks like the following:\n\nhttpd 78268 [001] 3461630.850950: probe:tcp_sendmsg_locked:\n ffffffff91461d91 tcp_sendmsg_locked+0x1\n ffffffff91462b57 tcp_sendmsg+0x27\n ffffffff9139814e sock_sendmsg+0x3e\n ffffffffc06dfe1d smb_send_kvec+0x28\n [...]\n ffffffffc06cfaf8 cifs_readpages+0x213\n ffffffff90e83c4b read_pages+0x6b\n ffffffff90e83f31 __do_page_cache_readahead+0x1c1\n ffffffff90e79e98 filemap_fault+0x788\n ffffffff90eb0458 __do_fault+0x38\n ffffffff90eb5280 do_fault+0x1a0\n ffffffff90eb7c84 __handle_mm_fault+0x4d4\n ffffffff90eb8093 handle_mm_fault+0xc3\n ffffffff90c74f6d __do_page_fault+0x1ed\n ffffffff90c75277 do_page_fault+0x37\n ffffffff9160111e page_fault+0x1e\n ffffffff9109e7b5 copyin+0x25\n ffffffff9109eb40 _copy_from_iter_full+0xe0\n ffffffff91462370 tcp_sendmsg_locked+0x5e0\n ffffffff91462370 tcp_sendmsg_locked+0x5e0\n ffffffff91462b57 tcp_sendmsg+0x27\n ffffffff9139815c sock_sendmsg+0x4c\n ffffffff913981f7 sock_write_iter+0x97\n ffffffff90f2cc56 do_iter_readv_writev+0x156\n ffffffff90f2dff0 do_iter_write+0x80\n ffffffff90f2e1c3 vfs_writev+0xa3\n ffffffff90f2e27c do_writev+0x5c\n ffffffff90c042bb do_syscall_64+0x5b\n ffffffff916000ad entry_SYSCALL_64_after_hwframe+0x65\n\nThe cifs filesystem rightfully sets sk_allocations to GFP_NOFS,\nwe can avoid the nesting using the sk page frag for allocation\nlacking the __GFP_FS flag. Do not define an additional mm-helper\nfor that, as this is strictly tied to the sk page frag usage.\n\nv1 -\u003e v2:\n - use a stricted sk_page_frag() check instead of reordering the\n code (Eric)", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: tcp: fix page frag corruption on page fault", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-47544" }, { "category": "external", "summary": "RHBZ#2283406", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2283406" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-47544", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47544" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47544", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47544" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2024052440-CVE-2021-47544-ceb5@gregkh/T", "url": "https://lore.kernel.org/linux-cve-announce/2024052440-CVE-2021-47544-ceb5@gregkh/T" } ], "release_date": "2024-05-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1975" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: tcp: fix page frag corruption on page fault" }, { "cve": "CVE-2021-47556", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-05-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2283393" } ], "notes": [ { "category": "description", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nethtool: ioctl: fix potential NULL deref in ethtool_set_coalesce()\n\nethtool_set_coalesce() now uses both the .get_coalesce() and\n.set_coalesce() callbacks. But the check for their availability is\nbuggy, so changing the coalesce settings on a device where the driver\nprovides only _one_ of the callbacks results in a NULL pointer\ndereference instead of an -EOPNOTSUPP.\n\nFix the condition so that the availability of both callbacks is\nensured. This also matches the netlink code.\n\nNote that reproducing this requires some effort - it only affects the\nlegacy ioctl path, and needs a specific combination of driver options:\n- have .get_coalesce() and .coalesce_supported but no\n .set_coalesce(), or\n- have .set_coalesce() but no .get_coalesce(). Here eg. ethtool doesn\u0027t\n cause the crash as it first attempts to call ethtool_get_coalesce()\n and bails out on error.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: ethtool: ioctl: fix potential NULL deref in ethtool_set_coalesce()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-47556" }, { "category": "external", "summary": "RHBZ#2283393", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2283393" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-47556", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47556" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47556", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47556" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2024052443-CVE-2021-47556-558e@gregkh/T", "url": "https://lore.kernel.org/linux-cve-announce/2024052443-CVE-2021-47556-558e@gregkh/T" } ], "release_date": "2024-05-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1975" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: ethtool: ioctl: fix potential NULL deref in ethtool_set_coalesce()" }, { "cve": "CVE-2021-47590", "cwe": { "id": "CWE-833", "name": "Deadlock" }, "discovery_date": "2024-06-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2293237" } ], "notes": [ { "category": "description", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: fix deadlock in __mptcp_push_pending()\n\n__mptcp_push_pending() may call mptcp_flush_join_list() with subflow\nsocket lock held. If such call hits mptcp_sockopt_sync_all() then\nsubsequently __mptcp_sockopt_sync() could try to lock the subflow\nsocket for itself, causing a deadlock.\n\nsysrq: Show Blocked State\ntask:ss-server state:D stack: 0 pid: 938 ppid: 1 flags:0x00000000\nCall Trace:\n \u003cTASK\u003e\n __schedule+0x2d6/0x10c0\n ? __mod_memcg_state+0x4d/0x70\n ? csum_partial+0xd/0x20\n ? _raw_spin_lock_irqsave+0x26/0x50\n schedule+0x4e/0xc0\n __lock_sock+0x69/0x90\n ? do_wait_intr_irq+0xa0/0xa0\n __lock_sock_fast+0x35/0x50\n mptcp_sockopt_sync_all+0x38/0xc0\n __mptcp_push_pending+0x105/0x200\n mptcp_sendmsg+0x466/0x490\n sock_sendmsg+0x57/0x60\n __sys_sendto+0xf0/0x160\n ? do_wait_intr_irq+0xa0/0xa0\n ? fpregs_restore_userregs+0x12/0xd0\n __x64_sys_sendto+0x20/0x30\n do_syscall_64+0x38/0x90\n entry_SYSCALL_64_after_hwframe+0x44/0xae\nRIP: 0033:0x7f9ba546c2d0\nRSP: 002b:00007ffdc3b762d8 EFLAGS: 00000246 ORIG_RAX: 000000000000002c\nRAX: ffffffffffffffda RBX: 00007f9ba56c8060 RCX: 00007f9ba546c2d0\nRDX: 000000000000077a RSI: 0000000000e5e180 RDI: 0000000000000234\nRBP: 0000000000cc57f0 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 00007f9ba56c8060\nR13: 0000000000b6ba60 R14: 0000000000cc7840 R15: 41d8685b1d7901b8\n \u003c/TASK\u003e\n\nFix the issue by using __mptcp_flush_join_list() instead of plain\nmptcp_flush_join_list() inside __mptcp_push_pending(), as suggested by\nFlorian. The sockopt sync will be deferred to the workqueue.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: mptcp: fix deadlock in __mptcp_push_pending()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-47590" }, { "category": "external", "summary": "RHBZ#2293237", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293237" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-47590", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47590" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47590", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47590" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2024061919-CVE-2021-47590-6db0@gregkh/T", "url": "https://lore.kernel.org/linux-cve-announce/2024061919-CVE-2021-47590-6db0@gregkh/T" } ], "release_date": "2024-06-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1975" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: mptcp: fix deadlock in __mptcp_push_pending()" }, { "cve": "CVE-2021-47614", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2024-06-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2293265" } ], "notes": [ { "category": "description", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/irdma: Fix a user-after-free in add_pble_prm\n\nWhen irdma_hmc_sd_one fails, \u0027chunk\u0027 is freed while its still on the PBLE\ninfo list.\n\nAdd the chunk entry to the PBLE info list only after successful setting of\nthe SD in irdma_hmc_sd_one.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: RDMA/irdma: Fix a user-after-free in add_pble_prm", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-47614" }, { "category": "external", "summary": "RHBZ#2293265", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293265" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-47614", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47614" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47614", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47614" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2024061908-CVE-2021-47614-6dd2@gregkh/T", "url": "https://lore.kernel.org/linux-cve-announce/2024061908-CVE-2021-47614-6dd2@gregkh/T" } ], "release_date": "2024-06-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1975" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: RDMA/irdma: Fix a user-after-free in add_pble_prm" }, { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2022-0001", "discovery_date": "2022-03-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2061712" } ], "notes": [ { "category": "description", "text": "A flaw was found in hw. The Branch History Injection (BHI) describes a specific form of intra-mode BTI. This flaw allows an unprivileged attacker to manipulate the branch history before transitioning to supervisor or VMX root mode. This issue is an effort to cause an indirect branch predictor to select a specific predictor entry for an indirect branch, and a disclosure gadget at the predicted target will transiently execute. This execution is possible since the relevant branch history may contain branches taken in previous security contexts, and in particular, in other predictor modes.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: cpu: intel: Branch History Injection (BHI)", "title": "Vulnerability summary" }, { "category": "other", "text": "The current known mechanisms to exploit this issue rely on unprivileged eBPF functionality. Unprivileged eBPF is disabled by default on Red Hat Enterprise Linux.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0001" }, { "category": "external", "summary": "RHBZ#2061712", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061712" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0001", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0001" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0001", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0001" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html", "url": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html" }, { "category": "external", "summary": "https://www.vusec.net/projects/bhi-spectre-bhb/", "url": "https://www.vusec.net/projects/bhi-spectre-bhb/" } ], "release_date": "2022-03-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1975" }, { "category": "workaround", "details": "Disabling unprivileged eBPF effectively mitigates the known attack vectors for exploiting intra-mode branch injections attacks.\n\nThe default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl.\n\nFor the Red Hat Enterprise Linux 7, the eBPF for unprivileged users is always disabled.\n\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nContinue to enable SMEP and Enhanced IBRS. This is the default setting on eligible CPUs.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: cpu: intel: Branch History Injection (BHI)" }, { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2022-0002", "discovery_date": "2022-03-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2061721" } ], "notes": [ { "category": "description", "text": "A flaw was found in hw. The Intra-mode BTI refers to a variant of Branch Target Injection aka SpectreV2 (BTI) where an indirect branch speculates to an aliased predictor entry for a different indirect branch in the same predictor mode, and a disclosure gadget at the predicted target transiently executes. These predictor entries may contain targets corresponding to the targets of an indirect near jump, indirect near call, and near return instructions, even if these branches were only transiently executed. The managed runtimes provide an attacker with the means to create the aliasing required for intra-mode BTI attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: cpu: intel: Intra-Mode BTI", "title": "Vulnerability summary" }, { "category": "other", "text": "The current known mechanisms to exploit this issue rely on unprivileged eBPF functionality. Unprivileged eBPF is disabled by default on Red Hat Enterprise Linux.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0002" }, { "category": "external", "summary": "RHBZ#2061721", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061721" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0002", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0002" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0002", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0002" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html", "url": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html" }, { "category": "external", "summary": "https://www.vusec.net/projects/bhi-spectre-bhb/", "url": "https://www.vusec.net/projects/bhi-spectre-bhb/" } ], "release_date": "2022-03-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1975" }, { "category": "workaround", "details": "Disabling unprivileged eBPF effectively mitigates the known attack vectors for exploiting intra-mode branch injections attacks.\n\nThe default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\n\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nContinue to enable SMEP and Enhanced IBRS. This is the default setting on eligible CPUs.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: cpu: intel: Intra-Mode BTI" }, { "acknowledgments": [ { "names": [ "De4dCr0w" ], "organization": "360 Vulnerability Research Institute" } ], "cve": "CVE-2022-0286", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2022-01-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2037019" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u2019s bonding driver in the way a user bonds non existing or fake device. This flaw allows a local user to crash the system, causing a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Local denial of service in bond_ipsec_add_sa", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0286" }, { "category": "external", "summary": "RHBZ#2037019", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037019" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0286", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0286" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0286", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0286" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=105cd17a866017b45f3c45901b394c711c97bf40", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=105cd17a866017b45f3c45901b394c711c97bf40" } ], "release_date": "2021-07-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1975" }, { "category": "workaround", "details": "To mitigate this issue, prevent the module bonding from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Local denial of service in bond_ipsec_add_sa" }, { "cve": "CVE-2022-0322", "cwe": { "id": "CWE-681", "name": "Incorrect Conversion between Numeric Types" }, "discovery_date": "2021-12-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2042822" } ], "notes": [ { "category": "description", "text": "A flaw was found in the sctp_make_strreset_req function in net/sctp/sm_make_chunk.c in the SCTP network protocol in the Linux kernel with a local user privilege access. In this flaw, an attempt to use more buffer than is allocated triggers a BUG_ON issue, leading to a denial of service (DOS).", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0322" }, { "category": "external", "summary": "RHBZ#2042822", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042822" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0322", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0322" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0322", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0322" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2d859e3fc97e79d907761550dbc03ff1b36479c", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2d859e3fc97e79d907761550dbc03ff1b36479c" } ], "release_date": "2021-10-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1975" }, { "category": "workaround", "details": "Mitigation for this issue is to skip loading the affected module SCTP onto the system. Until we have a fix available, this can be done by a blacklist mechanism and will ensure the driver is not loaded at the boot time.\n~~~\nHow do I blacklist a kernel module to prevent it from loading automatically?\nhttps://access.redhat.com/solutions/41278 \n~~~", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c" }, { "acknowledgments": [ { "names": [ "elijahbai" ], "organization": "Tencent Security Yunding Lab" } ], "cve": "CVE-2022-0850", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-11-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2060606" } ], "notes": [ { "category": "description", "text": "An information leak flaw was found via ext4_extent_header in fs/ext4/extents.c in the Linux kernel. This flaw could allow a local attacker to cause a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: information leak in copy_page_to_iter() in iov_iter.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0850" }, { "category": "external", "summary": "RHBZ#2060606", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2060606" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0850", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0850" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0850", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0850" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ce3aba43599f0b50adbebff133df8d08a3d5fffe", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ce3aba43599f0b50adbebff133df8d08a3d5fffe" }, { "category": "external", "summary": "https://syzkaller.appspot.com/bug?id=78e9ad0e6952a3ca16e8234724b2fa92d041b9b8", "url": "https://syzkaller.appspot.com/bug?id=78e9ad0e6952a3ca16e8234724b2fa92d041b9b8" } ], "release_date": "2021-05-06T19:30:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1975" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: information leak in copy_page_to_iter() in iov_iter.c" }, { "acknowledgments": [ { "names": [ "Miklos Szeredi", "Jann Horn" ] } ], "cve": "CVE-2022-1011", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064855" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the Linux kernel\u2019s FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes", "title": "Vulnerability summary" }, { "category": "other", "text": "For the Red Hat Enterprise Linux the issue actual if fuse or fuse3 package is installed on the system and only privileged user can install it.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1011" }, { "category": "external", "summary": "RHBZ#2064855", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064855" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1011", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1011" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1011", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1011" }, { "category": "external", "summary": "https://lore.kernel.org/lkml/20220414110839.241541230@linuxfoundation.org/", "url": "https://lore.kernel.org/lkml/20220414110839.241541230@linuxfoundation.org/" } ], "release_date": "2022-03-07T10:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1975" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes" }, { "acknowledgments": [ { "names": [ "Jiasheng Jiang" ] } ], "cve": "CVE-2022-3105", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2022-12-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2153067" } ], "notes": [ { "category": "description", "text": "An issue was discovered in the Linux kernel through 5.16-rc6. uapi_finalize in drivers/infiniband/core/uverbs_uapi.c lacks check of kmalloc_array().", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: RDMA/uverbs: NULL pointer dereference in uapi_finalize()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-3105" }, { "category": "external", "summary": "RHBZ#2153067", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153067" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3105", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3105" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3105", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3105" } ], "release_date": "2022-12-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1975" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: RDMA/uverbs: NULL pointer dereference in uapi_finalize()" }, { "acknowledgments": [ { "names": [ "Jiasheng Jiang" ] } ], "cve": "CVE-2022-3106", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2022-12-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2153066" } ], "notes": [ { "category": "description", "text": "An issue was discovered in the Linux kernel through 5.16-rc6. ef100_update_stats in drivers/net/ethernet/sfc/ef100_nic.c lacks check of the return value of kmalloc().", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: sfc_ef100: NULL pointer dereference in ef100_update_stats()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-3106" }, { "category": "external", "summary": "RHBZ#2153066", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153066" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3106", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3106" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3106", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3106" } ], "release_date": "2022-12-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1975" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: sfc_ef100: NULL pointer dereference in ef100_update_stats()" }, { "acknowledgments": [ { "names": [ "Jiasheng Jiang" ] } ], "cve": "CVE-2022-3108", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2022-12-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2153052" } ], "notes": [ { "category": "description", "text": "An issue was discovered in the Linux kernel through 5.16-rc6. kfd_parse_subtype_iolink in drivers/gpu/drm/amd/amdkfd/kfd_crat.c lacks check of the return value of kmemdup().", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: drm/amdkfd: NULL pointer dereference in kfd_parse_subtype_iolink()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-3108" }, { "category": "external", "summary": "RHBZ#2153052", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153052" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3108", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3108" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3108", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3108" } ], "release_date": "2022-12-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1975" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: drm/amdkfd: NULL pointer dereference in kfd_parse_subtype_iolink()" }, { "cve": "CVE-2023-0459", "cwe": { "id": "CWE-402", "name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)" }, "discovery_date": "2023-06-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2216383" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in copy_from_user in 64-bit versions of the Linux kernel. This flaw allows a local attacker to bypass the \"access_ok\" sanity check and pass a kernel pointer to copy_from_user(), resulting in kernel data leaking.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Copy_from_user on 64-bit versions may leak kernel information", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-0459" }, { "category": "external", "summary": "RHBZ#2216383", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216383" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-0459", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0459" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0459", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0459" }, { "category": "external", "summary": "https://github.com/torvalds/linux/commit/4b842e4e25b12951fa10dedb4bc16bc47e3b850c", "url": "https://github.com/torvalds/linux/commit/4b842e4e25b12951fa10dedb4bc16bc47e3b850c" } ], "release_date": "2020-02-15T06:30:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1975" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: Copy_from_user on 64-bit versions may leak kernel information" }, { "cve": "CVE-2023-3022", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2023-03-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2211440" } ], "notes": [ { "category": "description", "text": "A flaw was found in the IPv6 module of the Linux kernel. The arg.result was not used consistently in fib6_rule_lookup, sometimes holding rt6_info and other times fib6_info. This was not accounted for in other parts of the code where rt6_info was expected unconditionally, potentially leading to a kernel panic in fib6_rule_suppress.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: IPv6: panic in fib6_rule_suppress when fib6_rule_lookup fails", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-3022" }, { "category": "external", "summary": "RHBZ#2211440", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2211440" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-3022", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3022" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-3022", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-3022" } ], "release_date": "2019-04-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:43:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1975" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src", "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64", "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: IPv6: panic in fib6_rule_suppress when fib6_rule_lookup fails" } ] }
rhsa-2022_1988
Vulnerability from csaf_redhat
Published
2022-05-10 13:58
Modified
2024-12-12 15:53
Summary
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)
* kernel: avoid cyclic entity chains due to malformed USB descriptors (CVE-2020-0404)
* kernel: speculation on incompletely validated data on IBM Power9 (CVE-2020-4788)
* kernel: integer overflow in k_ascii() in drivers/tty/vt/keyboard.c (CVE-2020-13974)
* kernel: out-of-bounds read in bpf_skb_change_head() of filter.c due to a use-after-free (CVE-2021-0941)
* kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP() (CVE-2021-3612)
* kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts (CVE-2021-3669)
* kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c (CVE-2021-3743)
* kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd() (CVE-2021-3744)
* kernel: possible use-after-free in bluetooth module (CVE-2021-3752)
* kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks (CVE-2021-3759)
* kernel: DoS in ccp_run_aes_gcm_cmd() function (CVE-2021-3764)
* kernel: sctp: Invalid chunks may be used to remotely remove existing associations (CVE-2021-3772)
* kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients (CVE-2021-3773)
* kernel: possible leak or coruption of data residing on hugetlbfs (CVE-2021-4002)
* kernel: security regression for CVE-2018-13405 (CVE-2021-4037)
* kernel: Buffer overwrite in decode_nfs_fh function (CVE-2021-4157)
* kernel: cgroup: Use open-time creds and namespace for migration perm checks (CVE-2021-4197)
* kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses (CVE-2021-4203)
* kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies (CVE-2021-20322)
* kernel: arm: SIGPAGE information disclosure vulnerability (CVE-2021-21781)
* hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715 (CVE-2021-26401)
* kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation (CVE-2021-29154)
* kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c (CVE-2021-37159)
* kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write (CVE-2021-41864)
* kernel: Heap buffer overflow in firedtv driver (CVE-2021-42739)
* kernel: ppc: kvm: allows a malicious KVM guest to crash the host (CVE-2021-43056)
* kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c (CVE-2021-43389)
* kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device (CVE-2021-43976)
* kernel: use-after-free in the TEE subsystem (CVE-2021-44733)
* kernel: information leak in the IPv6 implementation (CVE-2021-45485)
* kernel: information leak in the IPv4 implementation (CVE-2021-45486)
* hw: cpu: intel: Branch History Injection (BHI) (CVE-2022-0001)
* hw: cpu: intel: Intra-Mode BTI (CVE-2022-0002)
* kernel: Local denial of service in bond_ipsec_add_sa (CVE-2022-0286)
* kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c (CVE-2022-0322)
* kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes (CVE-2022-1011)
* kernel: use-after-free in nouveau kernel module (CVE-2020-27820)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.6 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)\n\n* kernel: avoid cyclic entity chains due to malformed USB descriptors (CVE-2020-0404)\n\n* kernel: speculation on incompletely validated data on IBM Power9 (CVE-2020-4788)\n\n* kernel: integer overflow in k_ascii() in drivers/tty/vt/keyboard.c (CVE-2020-13974)\n\n* kernel: out-of-bounds read in bpf_skb_change_head() of filter.c due to a use-after-free (CVE-2021-0941)\n\n* kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP() (CVE-2021-3612)\n\n* kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts (CVE-2021-3669)\n\n* kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c (CVE-2021-3743)\n\n* kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd() (CVE-2021-3744)\n\n* kernel: possible use-after-free in bluetooth module (CVE-2021-3752)\n\n* kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks (CVE-2021-3759)\n\n* kernel: DoS in ccp_run_aes_gcm_cmd() function (CVE-2021-3764)\n\n* kernel: sctp: Invalid chunks may be used to remotely remove existing associations (CVE-2021-3772)\n\n* kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients (CVE-2021-3773)\n\n* kernel: possible leak or coruption of data residing on hugetlbfs (CVE-2021-4002)\n\n* kernel: security regression for CVE-2018-13405 (CVE-2021-4037)\n\n* kernel: Buffer overwrite in decode_nfs_fh function (CVE-2021-4157)\n\n* kernel: cgroup: Use open-time creds and namespace for migration perm checks (CVE-2021-4197)\n\n* kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses (CVE-2021-4203)\n\n* kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies (CVE-2021-20322)\n\n* kernel: arm: SIGPAGE information disclosure vulnerability (CVE-2021-21781)\n\n* hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715 (CVE-2021-26401)\n\n* kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation (CVE-2021-29154)\n\n* kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c (CVE-2021-37159)\n\n* kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write (CVE-2021-41864)\n\n* kernel: Heap buffer overflow in firedtv driver (CVE-2021-42739)\n\n* kernel: ppc: kvm: allows a malicious KVM guest to crash the host (CVE-2021-43056)\n\n* kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c (CVE-2021-43389)\n\n* kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device (CVE-2021-43976)\n\n* kernel: use-after-free in the TEE subsystem (CVE-2021-44733)\n\n* kernel: information leak in the IPv6 implementation (CVE-2021-45485)\n\n* kernel: information leak in the IPv4 implementation (CVE-2021-45486)\n\n* hw: cpu: intel: Branch History Injection (BHI) (CVE-2022-0001)\n\n* hw: cpu: intel: Intra-Mode BTI (CVE-2022-0002)\n\n* kernel: Local denial of service in bond_ipsec_add_sa (CVE-2022-0286)\n\n* kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c (CVE-2022-0322)\n\n* kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes (CVE-2022-1011)\n\n* kernel: use-after-free in nouveau kernel module (CVE-2020-27820)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.6 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1988", "url": "https://access.redhat.com/errata/RHSA-2022:1988" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.6_release_notes/", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.6_release_notes/" }, { "category": "external", "summary": "1888433", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1888433" }, { "category": "external", "summary": "1901726", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901726" }, { "category": "external", "summary": "1919791", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919791" }, { "category": "external", "summary": "1946684", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946684" }, { "category": "external", "summary": "1951739", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951739" }, { "category": "external", "summary": "1957375", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1957375" }, { "category": "external", "summary": "1974079", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974079" }, { "category": "external", "summary": "1978123", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1978123" }, { "category": "external", "summary": "1981950", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981950" }, { "category": "external", "summary": "1983894", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983894" }, { "category": "external", "summary": "1985353", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1985353" }, { "category": "external", "summary": "1986473", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986473" }, { "category": "external", "summary": "1994390", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1994390" }, { "category": "external", "summary": "1997338", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997338" }, { "category": "external", "summary": "1997467", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997467" }, { "category": "external", "summary": "1997961", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997961" }, { "category": "external", "summary": "1999544", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999544" }, { "category": "external", "summary": "1999675", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999675" }, { "category": "external", "summary": "2000627", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000627" }, { "category": "external", "summary": "2000694", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000694" }, { "category": "external", "summary": "2004949", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004949" }, { "category": "external", "summary": "2009312", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2009312" }, { "category": "external", "summary": "2009521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2009521" }, { "category": "external", "summary": "2010463", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010463" }, { "category": "external", "summary": "2011104", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011104" }, { "category": "external", "summary": "2013180", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013180" }, { "category": "external", "summary": "2014230", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2014230" }, { "category": "external", "summary": "2015525", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2015525" }, { "category": "external", "summary": "2015755", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2015755" }, { "category": "external", "summary": "2016169", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016169" }, { "category": "external", "summary": "2017073", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017073" }, { "category": "external", "summary": "2017796", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017796" }, { "category": "external", "summary": "2018205", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018205" }, { "category": "external", "summary": "2022814", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2022814" }, { "category": "external", "summary": "2025003", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025003" }, { "category": "external", "summary": "2025726", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025726" }, { "category": "external", "summary": "2027239", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027239" }, { "category": "external", "summary": "2029923", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923" }, { "category": "external", "summary": "2030476", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030476" }, { "category": "external", "summary": "2030747", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030747" }, { "category": "external", "summary": "2031200", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031200" }, { "category": "external", "summary": "2034342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034342" }, { "category": "external", "summary": "2035652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035652" }, { "category": "external", "summary": "2036934", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036934" }, { "category": "external", "summary": "2037019", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037019" }, { "category": "external", "summary": "2039911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039911" }, { "category": "external", "summary": "2039914", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039914" }, { "category": "external", "summary": "2042798", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042798" }, { "category": "external", "summary": "2042822", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042822" }, { "category": "external", "summary": "2043453", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043453" }, { "category": "external", "summary": "2046021", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046021" }, { "category": "external", "summary": "2048251", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2048251" }, { "category": "external", "summary": "2061700", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061700" }, { "category": "external", "summary": "2061712", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061712" }, { "category": "external", "summary": "2061721", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061721" }, { "category": "external", "summary": "2064855", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064855" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1988.json" } ], "title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-12-12T15:53:17+00:00", "generator": { "date": "2024-12-12T15:53:17+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:1988", "initial_release_date": "2022-05-10T13:58:00+00:00", "revision_history": [ { "date": "2022-05-10T13:58:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-05-10T13:58:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-12T15:53:17+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product": { "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux CRB (v. 8)", "product": { "name": "Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::crb" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-372.9.1.el8.aarch64", "product": { "name": "bpftool-0:4.18.0-372.9.1.el8.aarch64", "product_id": "bpftool-0:4.18.0-372.9.1.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-372.9.1.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-372.9.1.el8.aarch64", "product": { "name": "kernel-0:4.18.0-372.9.1.el8.aarch64", "product_id": "kernel-0:4.18.0-372.9.1.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-372.9.1.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-372.9.1.el8.aarch64", "product": { "name": "kernel-core-0:4.18.0-372.9.1.el8.aarch64", "product_id": "kernel-core-0:4.18.0-372.9.1.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.9.1.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "product": { "name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "product_id": "kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.9.1.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "product": { "name": "kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "product_id": "kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.9.1.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "product": { "name": "kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "product_id": "kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.9.1.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "product": { "name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "product_id": "kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.9.1.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "product": { "name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "product_id": "kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.9.1.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "product_id": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.9.1.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "product": { "name": "kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "product_id": "kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.9.1.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "product": { "name": "kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "product_id": "kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.9.1.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "product": { "name": "kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "product_id": "kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.9.1.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "product": { "name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "product_id": "kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.9.1.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "product": { "name": "kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "product_id": "kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.9.1.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "product": { "name": "kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "product_id": "kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-372.9.1.el8?arch=aarch64" } } }, { "category": "product_version", "name": "perf-0:4.18.0-372.9.1.el8.aarch64", "product": { "name": "perf-0:4.18.0-372.9.1.el8.aarch64", "product_id": "perf-0:4.18.0-372.9.1.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-372.9.1.el8?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-372.9.1.el8.aarch64", "product": { "name": "python3-perf-0:4.18.0-372.9.1.el8.aarch64", "product_id": "python3-perf-0:4.18.0-372.9.1.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.9.1.el8?arch=aarch64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "product": { "name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "product_id": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.9.1.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "product_id": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.9.1.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "product": { "name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "product_id": "kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.9.1.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "product": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-372.9.1.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "product_id": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.9.1.el8?arch=aarch64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "product": { "name": "perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "product_id": "perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.9.1.el8?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "product": { "name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "product_id": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.9.1.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "product_id": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-372.9.1.el8?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-372.9.1.el8.ppc64le", "product": { "name": "bpftool-0:4.18.0-372.9.1.el8.ppc64le", "product_id": "bpftool-0:4.18.0-372.9.1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-372.9.1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-372.9.1.el8.ppc64le", "product": { "name": "kernel-0:4.18.0-372.9.1.el8.ppc64le", "product_id": "kernel-0:4.18.0-372.9.1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-372.9.1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "product": { "name": "kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "product_id": "kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.9.1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "product": { "name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "product_id": "kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.9.1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "product": { "name": "kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "product_id": "kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.9.1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "product": { "name": "kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "product_id": "kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.9.1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "product": { "name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "product_id": "kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.9.1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "product": { "name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "product_id": "kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.9.1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "product_id": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.9.1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "product": { "name": "kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "product_id": "kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.9.1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "product": { "name": "kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "product_id": "kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.9.1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "product": { "name": "kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "product_id": "kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.9.1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "product": { "name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "product_id": "kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.9.1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "product": { "name": "kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "product_id": "kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.9.1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "product": { "name": "kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "product_id": "kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-372.9.1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:4.18.0-372.9.1.el8.ppc64le", "product": { "name": "perf-0:4.18.0-372.9.1.el8.ppc64le", "product_id": "perf-0:4.18.0-372.9.1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-372.9.1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "product": { "name": "python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "product_id": "python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.9.1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "product": { "name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "product_id": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.9.1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "product_id": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.9.1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "product": { "name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "product_id": "kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.9.1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-372.9.1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "product_id": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.9.1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "product": { "name": "perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "product_id": "perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.9.1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "product": { "name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "product_id": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.9.1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "product_id": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-372.9.1.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-372.9.1.el8.x86_64", "product": { "name": "bpftool-0:4.18.0-372.9.1.el8.x86_64", "product_id": "bpftool-0:4.18.0-372.9.1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-372.9.1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-372.9.1.el8.x86_64", "product": { "name": "kernel-0:4.18.0-372.9.1.el8.x86_64", "product_id": "kernel-0:4.18.0-372.9.1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-372.9.1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-372.9.1.el8.x86_64", "product": { "name": "kernel-core-0:4.18.0-372.9.1.el8.x86_64", "product_id": "kernel-core-0:4.18.0-372.9.1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.9.1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "product": { "name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "product_id": "kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.9.1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "product": { "name": "kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "product_id": "kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.9.1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "product": { "name": "kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "product_id": "kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.9.1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "product": { "name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "product_id": "kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.9.1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "product": { "name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "product_id": "kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.9.1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "product_id": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.9.1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "product": { "name": "kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "product_id": "kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.9.1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "product": { "name": "kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "product_id": "kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.9.1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "product": { "name": "kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "product_id": "kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.9.1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "product": { "name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "product_id": "kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.9.1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "product": { "name": "kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "product_id": "kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.9.1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "product": { "name": "kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "product_id": "kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-372.9.1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:4.18.0-372.9.1.el8.x86_64", "product": { "name": "perf-0:4.18.0-372.9.1.el8.x86_64", "product_id": "perf-0:4.18.0-372.9.1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-372.9.1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-372.9.1.el8.x86_64", "product": { "name": "python3-perf-0:4.18.0-372.9.1.el8.x86_64", "product_id": "python3-perf-0:4.18.0-372.9.1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.9.1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "product": { "name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "product_id": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.9.1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "product_id": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.9.1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "product": { "name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "product_id": "kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.9.1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-372.9.1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "product_id": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.9.1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "product": { "name": "perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "product_id": "perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.9.1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "product": { "name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "product_id": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.9.1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "product_id": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-372.9.1.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-372.9.1.el8.s390x", "product": { "name": "bpftool-0:4.18.0-372.9.1.el8.s390x", "product_id": "bpftool-0:4.18.0-372.9.1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-372.9.1.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-372.9.1.el8.s390x", "product": { "name": "kernel-0:4.18.0-372.9.1.el8.s390x", "product_id": "kernel-0:4.18.0-372.9.1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-372.9.1.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-372.9.1.el8.s390x", "product": { "name": "kernel-core-0:4.18.0-372.9.1.el8.s390x", "product_id": "kernel-core-0:4.18.0-372.9.1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.9.1.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "product": { "name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "product_id": "kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.9.1.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-372.9.1.el8.s390x", "product": { "name": "kernel-debug-0:4.18.0-372.9.1.el8.s390x", "product_id": "kernel-debug-0:4.18.0-372.9.1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.9.1.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "product": { "name": "kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "product_id": "kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.9.1.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "product": { "name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "product_id": "kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.9.1.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "product": { "name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "product_id": "kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.9.1.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "product_id": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.9.1.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-372.9.1.el8.s390x", "product": { "name": "kernel-devel-0:4.18.0-372.9.1.el8.s390x", "product_id": "kernel-devel-0:4.18.0-372.9.1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.9.1.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-372.9.1.el8.s390x", "product": { "name": "kernel-headers-0:4.18.0-372.9.1.el8.s390x", "product_id": "kernel-headers-0:4.18.0-372.9.1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.9.1.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-372.9.1.el8.s390x", "product": { "name": "kernel-modules-0:4.18.0-372.9.1.el8.s390x", "product_id": "kernel-modules-0:4.18.0-372.9.1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.9.1.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "product": { "name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "product_id": "kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.9.1.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-372.9.1.el8.s390x", "product": { "name": "kernel-tools-0:4.18.0-372.9.1.el8.s390x", "product_id": "kernel-tools-0:4.18.0-372.9.1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.9.1.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "product": { "name": "kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "product_id": "kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-372.9.1.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "product": { "name": "kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "product_id": "kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-372.9.1.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "product": { "name": "kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "product_id": "kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-372.9.1.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "product": { "name": "kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "product_id": "kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-372.9.1.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "product": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-372.9.1.el8?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:4.18.0-372.9.1.el8.s390x", "product": { "name": "perf-0:4.18.0-372.9.1.el8.s390x", "product_id": "perf-0:4.18.0-372.9.1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-372.9.1.el8?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-372.9.1.el8.s390x", "product": { "name": "python3-perf-0:4.18.0-372.9.1.el8.s390x", "product_id": "python3-perf-0:4.18.0-372.9.1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.9.1.el8?arch=s390x" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "product": { "name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "product_id": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.9.1.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "product_id": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.9.1.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "product": { "name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "product_id": "kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.9.1.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "product_id": "kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-372.9.1.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "product_id": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.9.1.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "product": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-372.9.1.el8?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "product": { "name": "perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "product_id": "perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.9.1.el8?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "product": { "name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "product_id": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.9.1.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-0:4.18.0-372.9.1.el8.src", "product": { "name": "kernel-0:4.18.0-372.9.1.el8.src", "product_id": "kernel-0:4.18.0-372.9.1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-372.9.1.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "product": { "name": "kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "product_id": "kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-stablelists@4.18.0-372.9.1.el8?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:4.18.0-372.9.1.el8.noarch", "product": { "name": "kernel-doc-0:4.18.0-372.9.1.el8.noarch", "product_id": "kernel-doc-0:4.18.0-372.9.1.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@4.18.0-372.9.1.el8?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64" }, "product_reference": "bpftool-0:4.18.0-372.9.1.el8.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le" }, "product_reference": "bpftool-0:4.18.0-372.9.1.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x" }, "product_reference": "bpftool-0:4.18.0-372.9.1.el8.s390x", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64" }, "product_reference": "bpftool-0:4.18.0-372.9.1.el8.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le" }, "product_reference": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x" }, "product_reference": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64" }, "product_reference": "kernel-0:4.18.0-372.9.1.el8.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le" }, "product_reference": "kernel-0:4.18.0-372.9.1.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x" }, "product_reference": "kernel-0:4.18.0-372.9.1.el8.s390x", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-372.9.1.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src" }, "product_reference": "kernel-0:4.18.0-372.9.1.el8.src", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64" }, "product_reference": "kernel-0:4.18.0-372.9.1.el8.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch" }, "product_reference": "kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64" }, "product_reference": "kernel-core-0:4.18.0-372.9.1.el8.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le" }, "product_reference": "kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x" }, "product_reference": "kernel-core-0:4.18.0-372.9.1.el8.s390x", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64" }, "product_reference": "kernel-core-0:4.18.0-372.9.1.el8.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64" }, "product_reference": "kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le" }, "product_reference": "kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x" }, "product_reference": "kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64" }, "product_reference": "kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le" }, "product_reference": "kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x" }, "product_reference": "kernel-debug-0:4.18.0-372.9.1.el8.s390x", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64" }, "product_reference": "kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le" }, "product_reference": "kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x" }, "product_reference": "kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64" }, "product_reference": "kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x" }, "product_reference": "kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64" }, "product_reference": "kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le" }, "product_reference": "kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x" }, "product_reference": "kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64" }, "product_reference": "kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x" }, "product_reference": "kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64" }, "product_reference": "kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le" }, "product_reference": "kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x" }, "product_reference": "kernel-devel-0:4.18.0-372.9.1.el8.s390x", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-372.9.1.el8.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch" }, "product_reference": "kernel-doc-0:4.18.0-372.9.1.el8.noarch", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64" }, "product_reference": "kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le" }, "product_reference": "kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x" }, "product_reference": "kernel-headers-0:4.18.0-372.9.1.el8.s390x", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64" }, "product_reference": "kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le" }, "product_reference": "kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x" }, "product_reference": "kernel-modules-0:4.18.0-372.9.1.el8.s390x", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64" }, "product_reference": "kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le" }, "product_reference": "kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x" }, "product_reference": "kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64" }, "product_reference": "kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le" }, "product_reference": "kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x" }, "product_reference": "kernel-tools-0:4.18.0-372.9.1.el8.s390x", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64" }, "product_reference": "kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x" }, "product_reference": "kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x" }, "product_reference": "kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64" }, "product_reference": "perf-0:4.18.0-372.9.1.el8.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le" }, "product_reference": "perf-0:4.18.0-372.9.1.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x" }, "product_reference": "perf-0:4.18.0-372.9.1.el8.s390x", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64" }, "product_reference": "perf-0:4.18.0-372.9.1.el8.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64" }, "product_reference": "perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le" }, "product_reference": "perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x" }, "product_reference": "perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64" }, "product_reference": "python3-perf-0:4.18.0-372.9.1.el8.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le" }, "product_reference": "python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x" }, "product_reference": "python3-perf-0:4.18.0-372.9.1.el8.s390x", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64" }, "product_reference": "python3-perf-0:4.18.0-372.9.1.el8.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "relates_to_product_reference": "BaseOS-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64" }, "product_reference": "bpftool-0:4.18.0-372.9.1.el8.aarch64", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le" }, "product_reference": "bpftool-0:4.18.0-372.9.1.el8.ppc64le", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x" }, "product_reference": "bpftool-0:4.18.0-372.9.1.el8.s390x", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64" }, "product_reference": "bpftool-0:4.18.0-372.9.1.el8.x86_64", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le" }, "product_reference": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x" }, "product_reference": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64" }, "product_reference": "kernel-0:4.18.0-372.9.1.el8.aarch64", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le" }, "product_reference": "kernel-0:4.18.0-372.9.1.el8.ppc64le", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x" }, "product_reference": "kernel-0:4.18.0-372.9.1.el8.s390x", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-372.9.1.el8.src as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src" }, "product_reference": "kernel-0:4.18.0-372.9.1.el8.src", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64" }, "product_reference": "kernel-0:4.18.0-372.9.1.el8.x86_64", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch" }, "product_reference": "kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64" }, "product_reference": "kernel-core-0:4.18.0-372.9.1.el8.aarch64", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le" }, "product_reference": "kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x" }, "product_reference": "kernel-core-0:4.18.0-372.9.1.el8.s390x", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64" }, "product_reference": "kernel-core-0:4.18.0-372.9.1.el8.x86_64", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64" }, "product_reference": "kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le" }, "product_reference": "kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x" }, "product_reference": "kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64" }, "product_reference": "kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le" }, "product_reference": "kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x" }, "product_reference": "kernel-debug-0:4.18.0-372.9.1.el8.s390x", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64" }, "product_reference": "kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le" }, "product_reference": "kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x" }, "product_reference": "kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64" }, "product_reference": "kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x" }, "product_reference": "kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64" }, "product_reference": "kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le" }, "product_reference": "kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x" }, "product_reference": "kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64" }, "product_reference": "kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x" }, "product_reference": "kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64" }, "product_reference": "kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le" }, "product_reference": "kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x" }, "product_reference": "kernel-devel-0:4.18.0-372.9.1.el8.s390x", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-372.9.1.el8.noarch as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch" }, "product_reference": "kernel-doc-0:4.18.0-372.9.1.el8.noarch", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64" }, "product_reference": "kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le" }, "product_reference": "kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x" }, "product_reference": "kernel-headers-0:4.18.0-372.9.1.el8.s390x", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64" }, "product_reference": "kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le" }, "product_reference": "kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x" }, "product_reference": "kernel-modules-0:4.18.0-372.9.1.el8.s390x", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64" }, "product_reference": "kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le" }, "product_reference": "kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x" }, "product_reference": "kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64" }, "product_reference": "kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le" }, "product_reference": "kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x" }, "product_reference": "kernel-tools-0:4.18.0-372.9.1.el8.s390x", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64" }, "product_reference": "kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x" }, "product_reference": "kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x" }, "product_reference": "kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64" }, "product_reference": "perf-0:4.18.0-372.9.1.el8.aarch64", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le" }, "product_reference": "perf-0:4.18.0-372.9.1.el8.ppc64le", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x" }, "product_reference": "perf-0:4.18.0-372.9.1.el8.s390x", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64" }, "product_reference": "perf-0:4.18.0-372.9.1.el8.x86_64", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64" }, "product_reference": "perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le" }, "product_reference": "perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x" }, "product_reference": "perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64" }, "product_reference": "python3-perf-0:4.18.0-372.9.1.el8.aarch64", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le" }, "product_reference": "python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x" }, "product_reference": "python3-perf-0:4.18.0-372.9.1.el8.s390x", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64" }, "product_reference": "python3-perf-0:4.18.0-372.9.1.el8.x86_64", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "relates_to_product_reference": "CRB-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "relates_to_product_reference": "CRB-8.6.0.GA" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0404", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2021-01-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1919791" } ], "notes": [ { "category": "description", "text": "A flaw linked list corruption in the Linux kernel for USB Video Class driver functionality was found in the way user connects web camera to the USB port. A local user could use this flaw to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: avoid cyclic entity chains due to malformed USB descriptors", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0404" }, { "category": "external", "summary": "RHBZ#1919791", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919791" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0404", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0404" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0404", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0404" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=68035c80e129c4cfec659aac4180354530b26527", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=68035c80e129c4cfec659aac4180354530b26527" } ], "release_date": "2021-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:58:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1988" }, { "category": "workaround", "details": "To mitigate this issue, prevent the module uvcvideo from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: avoid cyclic entity chains due to malformed USB descriptors" }, { "acknowledgments": [ { "names": [ "Anthony Steinhauser" ], "organization": "Google\u0027s Safeside Project" } ], "cve": "CVE-2020-4788", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-10-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1888433" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. IBM Power9 processors can speculatively operate on data stored in the L1 cache before it has been completely validated. The attack has limited access to memory and is only able to access memory normally permissible to the execution context. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: speculation on incompletely validated data on IBM Power9", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-4788" }, { "category": "external", "summary": "RHBZ#1888433", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1888433" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-4788", "url": "https://www.cve.org/CVERecord?id=CVE-2020-4788" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-4788", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-4788" }, { "category": "external", "summary": "https://exchange.xforce.ibmcloud.com/vulnerabilities/189296", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/189296" }, { "category": "external", "summary": "https://lore.kernel.org/linuxppc-dev/20201119231333.361771-1-dja@axtens.net/T/#me4f6a44748747e3327d27cd95200bf7a87486ffc", "url": "https://lore.kernel.org/linuxppc-dev/20201119231333.361771-1-dja@axtens.net/T/#me4f6a44748747e3327d27cd95200bf7a87486ffc" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2020/11/20/3", "url": "https://www.openwall.com/lists/oss-security/2020/11/20/3" } ], "release_date": "2020-11-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:58:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1988" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: speculation on incompletely validated data on IBM Power9" }, { "cve": "CVE-2020-13974", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2021-01-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2016169" } ], "notes": [ { "category": "description", "text": "A flaw integer overflow in the Linux kernel\u0027s virtual terminal keyboard driver was found in the way the user sends some specific keyboard code multiple times. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: integer overflow in k_ascii() in drivers/tty/vt/keyboard.c", "title": "Vulnerability summary" }, { "category": "other", "text": "No code depends on this integer overflow so it is unlikely that the vulnerability can be used for anything apart from crashing the system. The impact has been reduced to Moderate from Important based on this analysis.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-13974" }, { "category": "external", "summary": "RHBZ#2016169", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016169" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-13974", "url": "https://www.cve.org/CVERecord?id=CVE-2020-13974" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13974", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13974" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b86dab054059b970111b5516ae548efaae5b3aae", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b86dab054059b970111b5516ae548efaae5b3aae" } ], "release_date": "2020-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:58:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1988" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: integer overflow in k_ascii() in drivers/tty/vt/keyboard.c" }, { "acknowledgments": [ { "names": [ "Jeremy Cline" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2020-27820", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-11-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1901726" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Linux kernel, where a use-after-frees in nouveau\u0027s postclose() handler could happen if removing device (that is not common to remove video card physically without power-off, but same happens if \"unbind\" the driver).", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in nouveau kernel module", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having a Low impact because the issue can only be triggered by an privileged local user (or user with physical access) as the issue only happens during unbinding the driver or removing the device.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-27820" }, { "category": "external", "summary": "RHBZ#1901726", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901726" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-27820", "url": "https://www.cve.org/CVERecord?id=CVE-2020-27820" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27820", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27820" }, { "category": "external", "summary": "https://lore.kernel.org/dri-devel/20201103194912.184413-2-jcline@redhat.com/", "url": "https://lore.kernel.org/dri-devel/20201103194912.184413-2-jcline@redhat.com/" }, { "category": "external", "summary": "https://lore.kernel.org/dri-devel/20201103194912.184413-3-jcline@redhat.com/", "url": "https://lore.kernel.org/dri-devel/20201103194912.184413-3-jcline@redhat.com/" }, { "category": "external", "summary": "https://lore.kernel.org/dri-devel/20201103194912.184413-4-jcline@redhat.com/", "url": "https://lore.kernel.org/dri-devel/20201103194912.184413-4-jcline@redhat.com/" } ], "release_date": "2020-11-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:58:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1988" }, { "category": "workaround", "details": "To mitigate this issue, prevent the module nouveau from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: use-after-free in nouveau kernel module" }, { "cve": "CVE-2021-0941", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2021-10-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2018205" } ], "notes": [ { "category": "description", "text": "An out-of-bounds (OOB) memory access flaw was found in net/core/filter.c in __bpf_skb_max_len in the Linux kernel. A missing sanity check to the current MTU check may allow a local attacker with special user privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: out-of-bounds read in bpf_skb_change_head() of filter.c due to a use-after-free", "title": "Vulnerability summary" }, { "category": "other", "text": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-0941" }, { "category": "external", "summary": "RHBZ#2018205", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018205" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-0941", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0941" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0941", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0941" }, { "category": "external", "summary": "https://android.googlesource.com/kernel/common/+/6306c1189e77a513bf02720450bb43bd4ba5d8ae%5E%21/#F0", "url": "https://android.googlesource.com/kernel/common/+/6306c1189e77a513bf02720450bb43bd4ba5d8ae%5E%21/#F0" } ], "release_date": "2021-02-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:58:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1988" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: out-of-bounds read in bpf_skb_change_head() of filter.c due to a use-after-free" }, { "acknowledgments": [ { "names": [ "Murray McAllister" ] } ], "cve": "CVE-2021-3612", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2021-06-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1974079" } ], "notes": [ { "category": "description", "text": "An out-of-bounds memory write flaw was found in the Linux kernel\u2019s joystick devices subsystem, in the way the user calls ioctl JSIOCSBTNMAP. This flaw allows a local user to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP()", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having a Moderate impact because for the Red Hat Enterprise Linux the patch that made it possible writing memory out of bounds not applied yet, but still before that patch possible read out of bounds. Both in the default configuration of Red Hat Enterprise Linux the joysticks devices driver is disabled, so only privileged local user can enable it.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3612" }, { "category": "external", "summary": "RHBZ#1974079", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974079" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3612", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3612" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3612", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3612" }, { "category": "external", "summary": "https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/", "url": "https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/" } ], "release_date": "2021-06-20T12:28:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:58:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1988" }, { "category": "workaround", "details": "To mitigate this issue, prevent the module joydev from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP()" }, { "cve": "CVE-2021-3669", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2021-07-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986473" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. Measuring usage of the shared memory does not scale with large shared memory segment counts which could lead to resource exhaustion and DoS.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3669" }, { "category": "external", "summary": "RHBZ#1986473", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986473" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3669", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3669" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3669", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3669" } ], "release_date": "2021-08-02T06:02:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:58:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1988" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts" }, { "acknowledgments": [ { "names": [ "Active Defense Lab" ], "organization": "Venustech" } ], "cve": "CVE-2021-3743", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2021-08-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1997961" } ], "notes": [ { "category": "description", "text": "An out-of-bounds (OOB) memory read flaw was found in the Qualcomm IPC router protocol in the Linux kernel. A missing sanity check allows a local attacker to gain access to out-of-bounds memory, leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c", "title": "Vulnerability summary" }, { "category": "other", "text": "There was no shipped kernel version that was seen affected by this problem. These files are not built in our source code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3743" }, { "category": "external", "summary": "RHBZ#1997961", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997961" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3743", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3743" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3743", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3743" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=7e78c597c3eb", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=7e78c597c3eb" }, { "category": "external", "summary": "https://lists.openwall.net/netdev/2021/08/17/124", "url": "https://lists.openwall.net/netdev/2021/08/17/124" } ], "release_date": "2021-08-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:58:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1988" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c" }, { "cve": "CVE-2021-3744", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2021-08-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2000627" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. A memory leak in the ccp-ops crypto driver can allow attackers to cause a denial of service. This vulnerability is similar with the older CVE-2019-18808. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3744" }, { "category": "external", "summary": "RHBZ#2000627", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000627" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3744", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3744" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3744", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3744" }, { "category": "external", "summary": "https://kernel.googlesource.com/pub/scm/linux/kernel/git/herbert/crypto-2.6/+/505d9dcb0f7ddf9d075e729523a33d38642ae680%5E%21/#F0", "url": "https://kernel.googlesource.com/pub/scm/linux/kernel/git/herbert/crypto-2.6/+/505d9dcb0f7ddf9d075e729523a33d38642ae680%5E%21/#F0" } ], "release_date": "2021-08-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:58:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1988" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation baser or stability.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()" }, { "acknowledgments": [ { "names": [ "Likang Luo" ], "organization": "NSFOCUS Security Team" } ], "cve": "CVE-2021-3752", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2021-08-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1999544" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the Linux kernel\u2019s Bluetooth subsystem in the way user calls connect to the socket and disconnect simultaneously due to a race condition. This flaw allows a user to crash the system or escalate their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: possible use-after-free in bluetooth module", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Moderate impact because Only local users with privileges to access the sock_dgram Bluetooth socket can trigger this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3752" }, { "category": "external", "summary": "RHBZ#1999544", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999544" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3752", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3752" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3752", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3752" }, { "category": "external", "summary": "https://lore.kernel.org/lkml/20211115165435.133245729@linuxfoundation.org/", "url": "https://lore.kernel.org/lkml/20211115165435.133245729@linuxfoundation.org/" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2021/09/15/4", "url": "https://www.openwall.com/lists/oss-security/2021/09/15/4" } ], "release_date": "2021-09-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:58:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1988" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation baser or stability. The possible solution is to disable Bluetooth completely: https://access.redhat.com/solutions/2682931", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: possible use-after-free in bluetooth module" }, { "acknowledgments": [ { "names": [ "Yutian Yang" ], "organization": "Zhejiang University" } ], "cve": "CVE-2021-3759", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2021-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1999675" } ], "notes": [ { "category": "description", "text": "A memory overflow vulnerability was found in the Linux kernel\u2019s ipc functionality of the memcg subsystem, in the way a user calls the semget function multiple times, creating semaphores. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3759" }, { "category": "external", "summary": "RHBZ#1999675", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999675" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3759", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3759" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3759", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3759" }, { "category": "external", "summary": "https://lore.kernel.org/linux-mm/1626333284-1404-1-git-send-email-nglaive@gmail.com/", "url": "https://lore.kernel.org/linux-mm/1626333284-1404-1-git-send-email-nglaive@gmail.com/" } ], "release_date": "2021-07-15T09:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:58:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1988" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks" }, { "cve": "CVE-2021-3764", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2021-08-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1997467" } ], "notes": [ { "category": "description", "text": "A memory leak flaw was found in the Linux kernel\u0027s ccp_run_aes_gcm_cmd() function that allows an attacker to cause a denial of service. The vulnerability is similar to the older CVE-2019-18808. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: DoS in ccp_run_aes_gcm_cmd() function", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3764" }, { "category": "external", "summary": "RHBZ#1997467", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997467" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3764", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3764" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3764", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3764" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=36cf515b9bbe", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=36cf515b9bbe" } ], "release_date": "2021-08-20T09:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:58:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1988" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: DoS in ccp_run_aes_gcm_cmd() function" }, { "cve": "CVE-2021-3772", "cwe": { "id": "CWE-354", "name": "Improper Validation of Integrity Check Value" }, "discovery_date": "2021-08-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2000694" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux SCTP stack. A blind attacker may be able to kill an existing SCTP association through invalid chunks if the attacker knows the IP-addresses and port numbers being used and the attacker can send packets with spoofed IP addresses.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: sctp: Invalid chunks may be used to remotely remove existing associations", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3772" }, { "category": "external", "summary": "RHBZ#2000694", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000694" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3772", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3772" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3772", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3772" } ], "release_date": "2021-09-08T06:38:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:58:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1988" }, { "category": "workaround", "details": "As the SCTP module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\nif\n# echo \"install sctp /bin/true\" \u003e\u003e /etc/modprobe.d/disable-sctp.conf\n\nThe system will need to be restarted if the SCTP modules are loaded. In most circumstances, the SCTP kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: sctp: Invalid chunks may be used to remotely remove existing associations" }, { "cve": "CVE-2021-3773", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-09-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2004949" } ], "notes": [ { "category": "description", "text": "A flaw in netfilter could allow a network-connected attacker to infer openvpn connection endpoint information for further use in traditional network attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3773" }, { "category": "external", "summary": "RHBZ#2004949", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004949" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3773", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3773" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3773", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3773" } ], "release_date": "2021-09-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:58:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1988" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients" }, { "acknowledgments": [ { "names": [ "elijahbai, jitxie, huntazhang." ] } ], "cve": "CVE-2021-3923", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-11-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2019643" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s implementation of RDMA over infiniband. An attacker with a privileged local account can leak kernel stack information when issuing commands to the /dev/infiniband/rdma_cm device node. While this access is unlikely to leak sensitive user information, it can be further used to defeat existing kernel protection mechanisms.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: stack information leak in infiniband RDMA", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3923" }, { "category": "external", "summary": "RHBZ#2019643", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019643" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3923", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3923" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3923", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3923" } ], "release_date": "2021-12-01T13:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:58:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1988" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: stack information leak in infiniband RDMA" }, { "cve": "CVE-2021-4002", "cwe": { "id": "CWE-459", "name": "Incomplete Cleanup" }, "discovery_date": "2021-11-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2025726" } ], "notes": [ { "category": "description", "text": "A memory leak flaw in the Linux kernel\u0027s hugetlbfs memory usage was found in the way the user maps some regions of memory twice using shmget() which are aligned to PUD alignment with the fault of some of the memory pages. A local user could use this flaw to get unauthorized access to some data.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: possible leak or coruption of data residing on hugetlbfs", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-4002" }, { "category": "external", "summary": "RHBZ#2025726", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025726" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4002", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4002" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4002", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4002" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13e4ad2ce8df6e058ef482a31fdd81c725b0f7ea", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13e4ad2ce8df6e058ef482a31fdd81c725b0f7ea" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4a118f2eead1d6c49e00765de89878288d4b890", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4a118f2eead1d6c49e00765de89878288d4b890" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2021/11/25/1", "url": "https://www.openwall.com/lists/oss-security/2021/11/25/1" } ], "release_date": "2021-11-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:58:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1988" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: possible leak or coruption of data residing on hugetlbfs" }, { "cve": "CVE-2021-4037", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2021-11-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2027239" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the fs/inode.c:inode_init_owner() function logic of the LInux kernel that allows local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set, in a scenario where a directory is SGID and belongs to a certain group and is writable by a user who is not a member of this group. This can lead to excessive permissions granted in case when they should not. This vulnerability is similar to the previous CVE-2018-13405 and adds the missed fix for the XFS.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: security regression for CVE-2018-13405", "title": "Vulnerability summary" }, { "category": "other", "text": "The Impact is Moderate, because if no configuration problems with the system, then unlikely higher impact than unauthorized read access.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-4037" }, { "category": "external", "summary": "RHBZ#2027239", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027239" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4037", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4037" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4037", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4037" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=01ea173e103e", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=01ea173e103e" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0fa3ecd87848", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0fa3ecd87848" } ], "release_date": "2021-09-16T09:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:58:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1988" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: security regression for CVE-2018-13405" }, { "cve": "CVE-2021-4083", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2021-12-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2029923" } ], "notes": [ { "category": "description", "text": "A read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: fget: check that the fd still exists after getting a ref to it", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-4083" }, { "category": "external", "summary": "RHBZ#2029923", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4083", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4083" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9" } ], "release_date": "2021-12-03T08:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:58:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1988" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: fget: check that the fd still exists after getting a ref to it" }, { "cve": "CVE-2021-4093", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-11-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2028584" } ], "notes": [ { "category": "description", "text": "A flaw was found in the KVM\u0027s AMD code for supporting the Secure Encrypted Virtualization-Encrypted State (SEV-ES). A KVM guest using SEV-ES can trigger out-of-bounds reads and writes in the host kernel via a malicious VMGEXIT for a string I/O instruction (for example, outs or ins) using the exit reason SVM_EXIT_IOIO. This issue results in a crash of the entire system or a potential guest-to-host escape scenario.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: KVM: SVM: out-of-bounds read/write in sev_es_string_io", "title": "Vulnerability summary" }, { "category": "other", "text": "AMD Secure Encrypted Virtualization (SEV) is currently provided as a Technology Preview in RHEL and, therefore, unsupported for production use. For additional details please see https://access.redhat.com/articles/4491591 and https://access.redhat.com/support/offerings/techpreview.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-4093" }, { "category": "external", "summary": "RHBZ#2028584", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2028584" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4093", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4093" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4093", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4093" }, { "category": "external", "summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2222", "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2222" } ], "release_date": "2021-11-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:58:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1988" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: KVM: SVM: out-of-bounds read/write in sev_es_string_io" }, { "cve": "CVE-2021-4157", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2021-12-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034342" } ], "notes": [ { "category": "description", "text": "An out of memory bounds write flaw (1 or 2 bytes of memory) in the Linux kernel NFS subsystem was found in the way users use mirroring (replication of files with NFS). A user, having access to the NFS mount, could potentially use this flaw to crash the system or escalate privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Buffer overwrite in decode_nfs_fh function", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-4157" }, { "category": "external", "summary": "RHBZ#2034342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034342" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4157", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4157" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4157", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4157" }, { "category": "external", "summary": "https://lore.kernel.org/lkml/20210517140244.822185482@linuxfoundation.org/", "url": "https://lore.kernel.org/lkml/20210517140244.822185482@linuxfoundation.org/" } ], "release_date": "2021-05-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:58:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1988" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Buffer overwrite in decode_nfs_fh function" }, { "cve": "CVE-2021-4197", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2021-12-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2035652" } ], "notes": [ { "category": "description", "text": "An unprivileged write to the file handler flaw in the Linux kernel\u0027s control groups and namespaces subsystem was found in the way users have access to some less privileged process that are controlled by cgroups and have higher privileged parent process. It is actually both for cgroup2 and cgroup1 versions of control groups. A local user could use this flaw to crash the system or escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: cgroup: Use open-time creds and namespace for migration perm checks", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-4197" }, { "category": "external", "summary": "RHBZ#2035652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4197", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4197" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4197", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4197" }, { "category": "external", "summary": "https://lore.kernel.org/lkml/20211209214707.805617-1-tj@kernel.org/T/", "url": "https://lore.kernel.org/lkml/20211209214707.805617-1-tj@kernel.org/T/" } ], "release_date": "2021-09-12T09:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:58:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1988" }, { "category": "workaround", "details": "The mitigation not known. However, for the default configuration of the Red Hat Enterprise Linux it is not possible to trigger this vulnerability: if control groups (cgroups) not being used or being used with the default configuration or being used some other configuration where for example similar privileges for all processes (both for parent and for child processes), then no way to trigger this vulnerability.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: cgroup: Use open-time creds and namespace for migration perm checks" }, { "cve": "CVE-2021-4203", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-01-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2036934" } ], "notes": [ { "category": "description", "text": "A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()) in the Linux kernel. In this flaw, an attacker with a user privileges may crash the system or leak internal kernel information.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-4203" }, { "category": "external", "summary": "RHBZ#2036934", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036934" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4203", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4203" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4203", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4203" }, { "category": "external", "summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2230\u0026can=7\u0026q=modified-after%3Atoday-30\u0026sort=-modified\u0026colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary%20Modified%20Cve\u0026cells=tiles\u0026redir=1", "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2230\u0026can=7\u0026q=modified-after%3Atoday-30\u0026sort=-modified\u0026colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary%20Modified%20Cve\u0026cells=tiles\u0026redir=1" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=35306eb23814", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=35306eb23814" }, { "category": "external", "summary": "https://lore.kernel.org/netdev/20210929225750.2548112-1-eric.dumazet@gmail.com/T/", "url": "https://lore.kernel.org/netdev/20210929225750.2548112-1-eric.dumazet@gmail.com/T/" } ], "release_date": "2021-09-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:58:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1988" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "products": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses" }, { "acknowledgments": [ { "names": [ "Keyu Man, Xin\u0027an Zhou and Zhiyun Qian" ], "organization": "University of California, Riverside" } ], "cve": "CVE-2021-20322", "cwe": { "id": "CWE-330", "name": "Use of Insufficiently Random Values" }, "discovery_date": "2021-09-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2014230" } ], "notes": [ { "category": "description", "text": "A flaw in the processing of received ICMP errors (ICMP fragment needed and ICMP redirect) in the Linux kernel functionality was found to allow the ability to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypass the source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software that relies on UDP source port randomization are indirectly affected as well.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Moderate impact because of the attack scenario limitation. It is possible to harm the networking services only, but not for the overall system under attack, and impossible to get access to this remote system under attack.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-20322" }, { "category": "external", "summary": "RHBZ#2014230", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2014230" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-20322", "url": "https://www.cve.org/CVERecord?id=CVE-2021-20322" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20322", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20322" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6\u0026id=4785305c05b25a242e5314cc821f54ade4c18810", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6\u0026id=4785305c05b25a242e5314cc821f54ade4c18810" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6\u0026id=6457378fe796815c973f631a1904e147d6ee33b1", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6\u0026id=6457378fe796815c973f631a1904e147d6ee33b1" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/route.c?h=v5.15-rc6\u0026id=67d6d681e15b578c1725bad8ad079e05d1c48a8e", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/route.c?h=v5.15-rc6\u0026id=67d6d681e15b578c1725bad8ad079e05d1c48a8e" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv6/route.c?h=v5.15-rc6\u0026id=a00df2caffed3883c341d5685f830434312e4a43", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv6/route.c?h=v5.15-rc6\u0026id=a00df2caffed3883c341d5685f830434312e4a43" } ], "release_date": "2021-08-26T08:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:58:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1988" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies" }, { "cve": "CVE-2021-21781", "cwe": { "id": "CWE-908", "name": "Use of Uninitialized Resource" }, "discovery_date": "2021-07-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1981950" } ], "notes": [ { "category": "description", "text": "An information disclosure flaw exists in the ARM SIGPAGE functionality of the Linux kernel. An attacker with a local account can read the contents of the sigpage, which contains previously initialized kernel memory contents. This flaw requires an attacker to read a process\u2019s memory at a specific offset to trigger this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: arm: SIGPAGE information disclosure vulnerability", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-21781" }, { "category": "external", "summary": "RHBZ#1981950", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981950" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-21781", "url": "https://www.cve.org/CVERecord?id=CVE-2021-21781" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21781", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21781" }, { "category": "external", "summary": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1243", "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1243" } ], "release_date": "2021-06-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:58:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1988" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: arm: SIGPAGE information disclosure vulnerability" }, { "acknowledgments": [ { "names": [ "AMD" ] } ], "cve": "CVE-2021-26401", "discovery_date": "2022-03-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2061700" } ], "notes": [ { "category": "description", "text": "A flaw was found in hw. The speculative execution window of AMD LFENCE/JMP mitigation (MITIGATION V2-2) may be large enough to be exploited on AMD CPUs.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-26401" }, { "category": "external", "summary": "RHBZ#2061700", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061700" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-26401", "url": "https://www.cve.org/CVERecord?id=CVE-2021-26401" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-26401", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-26401" }, { "category": "external", "summary": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1036", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1036" } ], "release_date": "2022-03-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:58:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1988" }, { "category": "workaround", "details": "AMD recommends mitigation that uses generic retpoline.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715" }, { "cve": "CVE-2021-29154", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2021-04-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1946684" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernels eBPF implementation. By default, accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN. A local user with the ability to insert eBPF instructions can abuse a flaw in eBPF to corrupt memory. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having Moderate impact as eBPF requires a privileged user on Red Hat Enterprise Linux to correctly load eBPF instructions that can be exploited.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-29154" }, { "category": "external", "summary": "RHBZ#1946684", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946684" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-29154", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29154" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29154", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29154" } ], "release_date": "2021-04-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:58:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1988" }, { "category": "workaround", "details": "This issue does not affect most systems by default. An administrator would need to have enabled the BPF JIT to be affected.\n\nIt can be disabled immediately with the command:\n\n# echo 0 \u003e /proc/sys/net/core/bpf_jit_enable\n\nOr it can be disabled for all subsequent boots of the system by setting a value in /etc/sysctl.d/44-bpf-jit-disable\n\n## start file ##\n\nnet.core.bpf_jit_enable=0\n\n## end file ##", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation" }, { "cve": "CVE-2021-37159", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-07-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1985353" } ], "notes": [ { "category": "description", "text": "A flaw use-after-free in the Linux kernel USB High Speed Mobile Devices functionality was found in the way user detaches USB device. A local user could use this flaw to crash the system or escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-37159" }, { "category": "external", "summary": "RHBZ#1985353", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1985353" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-37159", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37159" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37159", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37159" }, { "category": "external", "summary": "https://www.spinics.net/lists/linux-usb/msg202228.html", "url": "https://www.spinics.net/lists/linux-usb/msg202228.html" } ], "release_date": "2020-10-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:58:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1988" }, { "category": "workaround", "details": "To mitigate this issue, prevent the module hso from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c" }, { "cve": "CVE-2021-41864", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2010463" } ], "notes": [ { "category": "description", "text": "An out-of-bounds (OOB) memory write flaw was found in prealloc_elems_and_freelist in kernel/bpf/stackmap.c in the bpf in the Linux kernel. In this flaw, the multiplication to calculate the size could lead to an integer overflow which could allow a local attacker, with a special user privilege, to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write", "title": "Vulnerability summary" }, { "category": "other", "text": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-41864" }, { "category": "external", "summary": "RHBZ#2010463", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010463" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-41864", "url": "https://www.cve.org/CVERecord?id=CVE-2021-41864" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-41864", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41864" }, { "category": "external", "summary": "https://github.com/torvalds/linux/commit/30e29a9a2bc6a4888335a6ede968b75cd329657a", "url": "https://github.com/torvalds/linux/commit/30e29a9a2bc6a4888335a6ede968b75cd329657a" } ], "release_date": "2021-09-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:58:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1988" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write" }, { "cve": "CVE-2021-42739", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2021-04-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1951739" } ], "notes": [ { "category": "description", "text": "A heap-based buffer overflow flaw was found in the Linux kernel FireDTV media card driver, where the user calls the CA_SEND_MSG ioctl. This flaw allows a local user of the host machine to crash the system or escalate privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Heap buffer overflow in firedtv driver", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-42739" }, { "category": "external", "summary": "RHBZ#1951739", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951739" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-42739", "url": "https://www.cve.org/CVERecord?id=CVE-2021-42739" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-42739", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-42739" }, { "category": "external", "summary": "https://lore.kernel.org/linux-media/YHaulytonFcW+lyZ@mwanda/", "url": "https://lore.kernel.org/linux-media/YHaulytonFcW+lyZ@mwanda/" } ], "release_date": "2021-04-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:58:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1988" }, { "category": "workaround", "details": "To mitigate this issue, prevent the module firedtv from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Heap buffer overflow in firedtv driver" }, { "cve": "CVE-2021-43056", "cwe": { "id": "CWE-252", "name": "Unchecked Return Value" }, "discovery_date": "2021-10-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2017073" } ], "notes": [ { "category": "description", "text": "A denial of service problem was found in the Linux kernel\u0027s Kernel-based Virtual Machine (KVM) specific to PowerPC. In this flaw, a user with local access can confuse the host offline code, causing the guest to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: ppc: kvm: allows a malicious KVM guest to crash the host", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-43056" }, { "category": "external", "summary": "RHBZ#2017073", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017073" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-43056", "url": "https://www.cve.org/CVERecord?id=CVE-2021-43056" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43056", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43056" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cdeb5d7d890e14f3b70e8087e745c4a6a7d9f337", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cdeb5d7d890e14f3b70e8087e745c4a6a7d9f337" } ], "release_date": "2021-10-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:58:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1988" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: ppc: kvm: allows a malicious KVM guest to crash the host" }, { "acknowledgments": [ { "names": [ "Active Defense Lab" ], "organization": "Venustech" } ], "cve": "CVE-2021-43389", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2021-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2013180" } ], "notes": [ { "category": "description", "text": "An improper validation of an array index and out of bounds memory read in the Linux kernel\u0027s Integrated Services Digital Network (ISDN) functionality was found in the way users call ioctl CMTPCONNADD. A local user could use this flaw to crash the system or starve the resources causing denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-43389" }, { "category": "external", "summary": "RHBZ#2013180", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013180" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-43389", "url": "https://www.cve.org/CVERecord?id=CVE-2021-43389" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43389", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43389" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d" }, { "category": "external", "summary": "https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA@mail.gmail.com/", "url": "https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA@mail.gmail.com/" } ], "release_date": "2021-09-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:58:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1988" }, { "category": "workaround", "details": "To mitigate this issue, prevent the module isdn from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c" }, { "cve": "CVE-2021-43976", "cwe": { "id": "CWE-459", "name": "Incomplete Cleanup" }, "discovery_date": "2021-11-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2025003" } ], "notes": [ { "category": "description", "text": "A denial of service flaw was found in mwifiex_usb_recv in drivers/net/wireless/marvell/mwifiex/usb.c in the usb subsystem of the Linux kernel. This is due to a missing clean-up for a malfunctioning usb device with an unknown recv_type.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-43976" }, { "category": "external", "summary": "RHBZ#2025003", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025003" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-43976", "url": "https://www.cve.org/CVERecord?id=CVE-2021-43976" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43976", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43976" }, { "category": "external", "summary": "https://patchwork.kernel.org/project/linux-wireless/patch/YX4CqjfRcTa6bVL+@Zekuns-MBP-16.fios-router.home/", "url": "https://patchwork.kernel.org/project/linux-wireless/patch/YX4CqjfRcTa6bVL+@Zekuns-MBP-16.fios-router.home/" } ], "release_date": "2021-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:58:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1988" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device" }, { "acknowledgments": [ { "names": [ "Patrik Lantz" ], "organization": "axis.com" } ], "cve": "CVE-2021-44733", "cwe": { "id": "CWE-908", "name": "Use of Uninitialized Resource" }, "discovery_date": "2021-12-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2030747" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw in the Linux kernel TEE (Trusted Execution Environment) subsystem was found in the way user calls ioctl TEE_IOC_OPEN_SESSION or TEE_IOC_INVOKE. A local user could use this flaw to crash the system or escalate their privileges on the system. If the Linux system non configured with the CONFIG_PREEMPT option or CONFIG_CPU_SW_DOMAIN_PAN option enabled, then it is unlikely that a user can trigger this issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in the TEE subsystem", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-44733" }, { "category": "external", "summary": "RHBZ#2030747", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030747" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-44733", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44733" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44733", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44733" }, { "category": "external", "summary": "https://lore.kernel.org/lkml/20211214123540.1789434-1-jens.wiklander@linaro.org/", "url": "https://lore.kernel.org/lkml/20211214123540.1789434-1-jens.wiklander@linaro.org/" } ], "release_date": "2021-12-14T12:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:58:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1988" }, { "category": "workaround", "details": "To mitigate this issue, prevent the modules tee, trusted_tee from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free in the TEE subsystem" }, { "cve": "CVE-2021-45485", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "discovery_date": "2021-12-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2039911" } ], "notes": [ { "category": "description", "text": "An information leak flaw was found in the Linux kernel\u2019s IPv6 implementation in the __ipv6_select_ident in net/ipv6/output_core.c function. The use of a small hash table in IP ID generation allows a remote attacker to reveal sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: information leak in the IPv6 implementation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-45485" }, { "category": "external", "summary": "RHBZ#2039911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039911" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-45485", "url": "https://www.cve.org/CVERecord?id=CVE-2021-45485" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45485", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45485" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=62f20e068ccc50d6ab66fdb72ba90da2b9418c99", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=62f20e068ccc50d6ab66fdb72ba90da2b9418c99" }, { "category": "external", "summary": "https://lore.kernel.org/all/20210529110746.6796-1-w@1wt.eu/", "url": "https://lore.kernel.org/all/20210529110746.6796-1-w@1wt.eu/" } ], "release_date": "2021-05-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:58:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1988" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: information leak in the IPv6 implementation" }, { "cve": "CVE-2021-45486", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-12-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2039914" } ], "notes": [ { "category": "description", "text": "An information leak flaw was found in the Linux kernel\u2019s IPv4 implementation in the ip_rt_init in net/ipv4/route.c function. The use of a small hash table in IP ID generation allows a remote attacker to reveal sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: information leak in the IPv4 implementation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-45486" }, { "category": "external", "summary": "RHBZ#2039914", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039914" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-45486", "url": "https://www.cve.org/CVERecord?id=CVE-2021-45486" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45486", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45486" }, { "category": "external", "summary": "https://arxiv.org/pdf/2112.09604.pdf", "url": "https://arxiv.org/pdf/2112.09604.pdf" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/net/ipv4/route.c?id=aa6dd211e4b1dde9d5dc25d699d35f789ae7eeba", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/net/ipv4/route.c?id=aa6dd211e4b1dde9d5dc25d699d35f789ae7eeba" } ], "release_date": "2021-03-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:58:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1988" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: information leak in the IPv4 implementation" }, { "cve": "CVE-2021-47076", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2267525" } ], "notes": [ { "category": "description", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/rxe: Return CQE error if invalid lkey was supplied\n\nRXE is missing update of WQE status in LOCAL_WRITE failures. This caused\nthe following kernel panic if someone sent an atomic operation with an\nexplicitly wrong lkey.\n\n[leonro@vm ~]$ mkt test\ntest_atomic_invalid_lkey (tests.test_atomic.AtomicTest) ...\n WARNING: CPU: 5 PID: 263 at drivers/infiniband/sw/rxe/rxe_comp.c:740 rxe_completer+0x1a6d/0x2e30 [rdma_rxe]\n Modules linked in: crc32_generic rdma_rxe ip6_udp_tunnel udp_tunnel rdma_ucm rdma_cm ib_umad ib_ipoib iw_cm ib_cm mlx5_ib ib_uverbs ib_core mlx5_core ptp pps_core\n CPU: 5 PID: 263 Comm: python3 Not tainted 5.13.0-rc1+ #2936\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\n RIP: 0010:rxe_completer+0x1a6d/0x2e30 [rdma_rxe]\n Code: 03 0f 8e 65 0e 00 00 3b 93 10 06 00 00 0f 84 82 0a 00 00 4c 89 ff 4c 89 44 24 38 e8 2d 74 a9 e1 4c 8b 44 24 38 e9 1c f5 ff ff \u003c0f\u003e 0b e9 0c e8 ff ff b8 05 00 00 00 41 bf 05 00 00 00 e9 ab e7 ff\n RSP: 0018:ffff8880158af090 EFLAGS: 00010246\n RAX: 0000000000000000 RBX: ffff888016a78000 RCX: ffffffffa0cf1652\n RDX: 1ffff9200004b442 RSI: 0000000000000004 RDI: ffffc9000025a210\n RBP: dffffc0000000000 R08: 00000000ffffffea R09: ffff88801617740b\n R10: ffffed1002c2ee81 R11: 0000000000000007 R12: ffff88800f3b63e8\n R13: ffff888016a78008 R14: ffffc9000025a180 R15: 000000000000000c\n FS: 00007f88b622a740(0000) GS:ffff88806d540000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 00007f88b5a1fa10 CR3: 000000000d848004 CR4: 0000000000370ea0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n Call Trace:\n rxe_do_task+0x130/0x230 [rdma_rxe]\n rxe_rcv+0xb11/0x1df0 [rdma_rxe]\n rxe_loopback+0x157/0x1e0 [rdma_rxe]\n rxe_responder+0x5532/0x7620 [rdma_rxe]\n rxe_do_task+0x130/0x230 [rdma_rxe]\n rxe_rcv+0x9c8/0x1df0 [rdma_rxe]\n rxe_loopback+0x157/0x1e0 [rdma_rxe]\n rxe_requester+0x1efd/0x58c0 [rdma_rxe]\n rxe_do_task+0x130/0x230 [rdma_rxe]\n rxe_post_send+0x998/0x1860 [rdma_rxe]\n ib_uverbs_post_send+0xd5f/0x1220 [ib_uverbs]\n ib_uverbs_write+0x847/0xc80 [ib_uverbs]\n vfs_write+0x1c5/0x840\n ksys_write+0x176/0x1d0\n do_syscall_64+0x3f/0x80\n entry_SYSCALL_64_after_hwframe+0x44/0xae", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: RDMA/rxe: Return CQE error if invalid lkey was supplied", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-47076" }, { "category": "external", "summary": "RHBZ#2267525", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267525" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-47076", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47076" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47076", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47076" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2024030142-CVE-2021-47076-a6b6@gregkh/T/#u", "url": "https://lore.kernel.org/linux-cve-announce/2024030142-CVE-2021-47076-a6b6@gregkh/T/#u" } ], "release_date": "2024-03-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:58:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1988" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: RDMA/rxe: Return CQE error if invalid lkey was supplied" }, { "cve": "CVE-2021-47203", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-04-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2274634" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the Linux kernel while parsing the txq list in the lpfc_drain_txq() function. Due to improper handling of a local fail message string which is set when a job fails and is never unset for subsequent jobs, this issue can lead to list corruption as jobs may be added to both the txq and the completions list. This could result in system instability or inconsistencies.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq()", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is fixed in RHEL-8.6 and above (including 8.10):\n~~~\nin (rhel-8.6, rhel-8.7, rhel-8.8, rhel-8.9, rhel-8.10) scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq()\n\n~~~", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-47203" }, { "category": "external", "summary": "RHBZ#2274634", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2274634" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-47203", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47203" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47203", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47203" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2024041037-CVE-2021-47203-ff72@gregkh/T", "url": "https://lore.kernel.org/linux-cve-announce/2024041037-CVE-2021-47203-ff72@gregkh/T" } ], "release_date": "2024-04-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:58:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1988" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq()" }, { "cve": "CVE-2021-47435", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-05-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2282879" } ], "notes": [ { "category": "description", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm: fix mempool NULL pointer race when completing IO\n\ndm_io_dec_pending() calls end_io_acct() first and will then dec md\nin-flight pending count. But if a task is swapping DM table at same\ntime this can result in a crash due to mempool-\u003eelements being NULL:\n\ntask1 task2\ndo_resume\n -\u003edo_suspend\n -\u003edm_wait_for_completion\n bio_endio\n\t\t\t\t -\u003eclone_endio\n\t\t\t\t -\u003edm_io_dec_pending\n\t\t\t\t -\u003eend_io_acct\n\t\t\t\t -\u003ewakeup task1\n -\u003edm_swap_table\n -\u003e__bind\n -\u003e__bind_mempools\n -\u003ebioset_exit\n -\u003emempool_exit\n -\u003efree_io\n\n[ 67.330330] Unable to handle kernel NULL pointer dereference at\nvirtual address 0000000000000000\n......\n[ 67.330494] pstate: 80400085 (Nzcv daIf +PAN -UAO)\n[ 67.330510] pc : mempool_free+0x70/0xa0\n[ 67.330515] lr : mempool_free+0x4c/0xa0\n[ 67.330520] sp : ffffff8008013b20\n[ 67.330524] x29: ffffff8008013b20 x28: 0000000000000004\n[ 67.330530] x27: ffffffa8c2ff40a0 x26: 00000000ffff1cc8\n[ 67.330535] x25: 0000000000000000 x24: ffffffdada34c800\n[ 67.330541] x23: 0000000000000000 x22: ffffffdada34c800\n[ 67.330547] x21: 00000000ffff1cc8 x20: ffffffd9a1304d80\n[ 67.330552] x19: ffffffdada34c970 x18: 000000b312625d9c\n[ 67.330558] x17: 00000000002dcfbf x16: 00000000000006dd\n[ 67.330563] x15: 000000000093b41e x14: 0000000000000010\n[ 67.330569] x13: 0000000000007f7a x12: 0000000034155555\n[ 67.330574] x11: 0000000000000001 x10: 0000000000000001\n[ 67.330579] x9 : 0000000000000000 x8 : 0000000000000000\n[ 67.330585] x7 : 0000000000000000 x6 : ffffff80148b5c1a\n[ 67.330590] x5 : ffffff8008013ae0 x4 : 0000000000000001\n[ 67.330596] x3 : ffffff80080139c8 x2 : ffffff801083bab8\n[ 67.330601] x1 : 0000000000000000 x0 : ffffffdada34c970\n[ 67.330609] Call trace:\n[ 67.330616] mempool_free+0x70/0xa0\n[ 67.330627] bio_put+0xf8/0x110\n[ 67.330638] dec_pending+0x13c/0x230\n[ 67.330644] clone_endio+0x90/0x180\n[ 67.330649] bio_endio+0x198/0x1b8\n[ 67.330655] dec_pending+0x190/0x230\n[ 67.330660] clone_endio+0x90/0x180\n[ 67.330665] bio_endio+0x198/0x1b8\n[ 67.330673] blk_update_request+0x214/0x428\n[ 67.330683] scsi_end_request+0x2c/0x300\n[ 67.330688] scsi_io_completion+0xa0/0x710\n[ 67.330695] scsi_finish_command+0xd8/0x110\n[ 67.330700] scsi_softirq_done+0x114/0x148\n[ 67.330708] blk_done_softirq+0x74/0xd0\n[ 67.330716] __do_softirq+0x18c/0x374\n[ 67.330724] irq_exit+0xb4/0xb8\n[ 67.330732] __handle_domain_irq+0x84/0xc0\n[ 67.330737] gic_handle_irq+0x148/0x1b0\n[ 67.330744] el1_irq+0xe8/0x190\n[ 67.330753] lpm_cpuidle_enter+0x4f8/0x538\n[ 67.330759] cpuidle_enter_state+0x1fc/0x398\n[ 67.330764] cpuidle_enter+0x18/0x20\n[ 67.330772] do_idle+0x1b4/0x290\n[ 67.330778] cpu_startup_entry+0x20/0x28\n[ 67.330786] secondary_start_kernel+0x160/0x170\n\nFix this by:\n1) Establishing pointers to \u0027struct dm_io\u0027 members in\ndm_io_dec_pending() so that they may be passed into end_io_acct()\n_after_ free_io() is called.\n2) Moving end_io_acct() after free_io().", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: dm: fix mempool NULL pointer race when completing IO", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-47435" }, { "category": "external", "summary": "RHBZ#2282879", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282879" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-47435", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47435" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47435", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47435" } ], "release_date": "2024-05-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:58:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1988" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: dm: fix mempool NULL pointer race when completing IO" }, { "cve": "CVE-2021-47498", "cwe": { "id": "CWE-399", "name": "CWE-399" }, "discovery_date": "2024-05-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2282917" } ], "notes": [ { "category": "description", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm rq: don\u0027t queue request to blk-mq during DM suspend\n\nDM uses blk-mq\u0027s quiesce/unquiesce to stop/start device mapper queue.\n\nBut blk-mq\u0027s unquiesce may come from outside events, such as elevator\nswitch, updating nr_requests or others, and request may come during\nsuspend, so simply ask for blk-mq to requeue it.\n\nFixes one kernel panic issue when running updating nr_requests and\ndm-mpath suspend/resume stress test.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: dm rq: don\u0027t queue request to blk-mq during DM suspend", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is fixed in RHEL-8.6 and above (including 8.10):\n~~~\nin (rhel-8.6, rhel-8.7, rhel-8.8, rhel-8.9, rhel-8.10) dm rq: don\u0027t queue request to blk-mq during DM suspend\n~~~", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-47498" }, { "category": "external", "summary": "RHBZ#2282917", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282917" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-47498", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47498" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47498", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47498" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2024052243-CVE-2021-47498-dc02@gregkh/T", "url": "https://lore.kernel.org/linux-cve-announce/2024052243-CVE-2021-47498-dc02@gregkh/T" } ], "release_date": "2024-05-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:58:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1988" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: dm rq: don\u0027t queue request to blk-mq during DM suspend" }, { "cve": "CVE-2021-47501", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-05-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2283453" } ], "notes": [ { "category": "description", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni40e: Fix NULL pointer dereference in i40e_dbg_dump_desc\n\nWhen trying to dump VFs VSI RX/TX descriptors\nusing debugfs there was a crash\ndue to NULL pointer dereference in i40e_dbg_dump_desc.\nAdded a check to i40e_dbg_dump_desc that checks if\nVSI type is correct for dumping RX/TX descriptors.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: i40e: Fix NULL pointer dereference in i40e_dbg_dump_desc", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-47501" }, { "category": "external", "summary": "RHBZ#2283453", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2283453" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-47501", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47501" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47501", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47501" } ], "release_date": "2024-05-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:58:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1988" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: i40e: Fix NULL pointer dereference in i40e_dbg_dump_desc" }, { "cve": "CVE-2021-47544", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-05-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2283406" } ], "notes": [ { "category": "description", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: fix page frag corruption on page fault\n\nSteffen reported a TCP stream corruption for HTTP requests\nserved by the apache web-server using a cifs mount-point\nand memory mapping the relevant file.\n\nThe root cause is quite similar to the one addressed by\ncommit 20eb4f29b602 (\"net: fix sk_page_frag() recursion from\nmemory reclaim\"). Here the nested access to the task page frag\nis caused by a page fault on the (mmapped) user-space memory\nbuffer coming from the cifs file.\n\nThe page fault handler performs an smb transaction on a different\nsocket, inside the same process context. Since sk-\u003esk_allaction\nfor such socket does not prevent the usage for the task_frag,\nthe nested allocation modify \"under the hood\" the page frag\nin use by the outer sendmsg call, corrupting the stream.\n\nThe overall relevant stack trace looks like the following:\n\nhttpd 78268 [001] 3461630.850950: probe:tcp_sendmsg_locked:\n ffffffff91461d91 tcp_sendmsg_locked+0x1\n ffffffff91462b57 tcp_sendmsg+0x27\n ffffffff9139814e sock_sendmsg+0x3e\n ffffffffc06dfe1d smb_send_kvec+0x28\n [...]\n ffffffffc06cfaf8 cifs_readpages+0x213\n ffffffff90e83c4b read_pages+0x6b\n ffffffff90e83f31 __do_page_cache_readahead+0x1c1\n ffffffff90e79e98 filemap_fault+0x788\n ffffffff90eb0458 __do_fault+0x38\n ffffffff90eb5280 do_fault+0x1a0\n ffffffff90eb7c84 __handle_mm_fault+0x4d4\n ffffffff90eb8093 handle_mm_fault+0xc3\n ffffffff90c74f6d __do_page_fault+0x1ed\n ffffffff90c75277 do_page_fault+0x37\n ffffffff9160111e page_fault+0x1e\n ffffffff9109e7b5 copyin+0x25\n ffffffff9109eb40 _copy_from_iter_full+0xe0\n ffffffff91462370 tcp_sendmsg_locked+0x5e0\n ffffffff91462370 tcp_sendmsg_locked+0x5e0\n ffffffff91462b57 tcp_sendmsg+0x27\n ffffffff9139815c sock_sendmsg+0x4c\n ffffffff913981f7 sock_write_iter+0x97\n ffffffff90f2cc56 do_iter_readv_writev+0x156\n ffffffff90f2dff0 do_iter_write+0x80\n ffffffff90f2e1c3 vfs_writev+0xa3\n ffffffff90f2e27c do_writev+0x5c\n ffffffff90c042bb do_syscall_64+0x5b\n ffffffff916000ad entry_SYSCALL_64_after_hwframe+0x65\n\nThe cifs filesystem rightfully sets sk_allocations to GFP_NOFS,\nwe can avoid the nesting using the sk page frag for allocation\nlacking the __GFP_FS flag. Do not define an additional mm-helper\nfor that, as this is strictly tied to the sk page frag usage.\n\nv1 -\u003e v2:\n - use a stricted sk_page_frag() check instead of reordering the\n code (Eric)", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: tcp: fix page frag corruption on page fault", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-47544" }, { "category": "external", "summary": "RHBZ#2283406", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2283406" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-47544", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47544" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47544", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47544" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2024052440-CVE-2021-47544-ceb5@gregkh/T", "url": "https://lore.kernel.org/linux-cve-announce/2024052440-CVE-2021-47544-ceb5@gregkh/T" } ], "release_date": "2024-05-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:58:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1988" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: tcp: fix page frag corruption on page fault" }, { "cve": "CVE-2021-47556", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-05-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2283393" } ], "notes": [ { "category": "description", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nethtool: ioctl: fix potential NULL deref in ethtool_set_coalesce()\n\nethtool_set_coalesce() now uses both the .get_coalesce() and\n.set_coalesce() callbacks. But the check for their availability is\nbuggy, so changing the coalesce settings on a device where the driver\nprovides only _one_ of the callbacks results in a NULL pointer\ndereference instead of an -EOPNOTSUPP.\n\nFix the condition so that the availability of both callbacks is\nensured. This also matches the netlink code.\n\nNote that reproducing this requires some effort - it only affects the\nlegacy ioctl path, and needs a specific combination of driver options:\n- have .get_coalesce() and .coalesce_supported but no\n .set_coalesce(), or\n- have .set_coalesce() but no .get_coalesce(). Here eg. ethtool doesn\u0027t\n cause the crash as it first attempts to call ethtool_get_coalesce()\n and bails out on error.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: ethtool: ioctl: fix potential NULL deref in ethtool_set_coalesce()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-47556" }, { "category": "external", "summary": "RHBZ#2283393", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2283393" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-47556", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47556" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47556", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47556" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2024052443-CVE-2021-47556-558e@gregkh/T", "url": "https://lore.kernel.org/linux-cve-announce/2024052443-CVE-2021-47556-558e@gregkh/T" } ], "release_date": "2024-05-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:58:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1988" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: ethtool: ioctl: fix potential NULL deref in ethtool_set_coalesce()" }, { "cve": "CVE-2021-47590", "cwe": { "id": "CWE-833", "name": "Deadlock" }, "discovery_date": "2024-06-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2293237" } ], "notes": [ { "category": "description", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: fix deadlock in __mptcp_push_pending()\n\n__mptcp_push_pending() may call mptcp_flush_join_list() with subflow\nsocket lock held. If such call hits mptcp_sockopt_sync_all() then\nsubsequently __mptcp_sockopt_sync() could try to lock the subflow\nsocket for itself, causing a deadlock.\n\nsysrq: Show Blocked State\ntask:ss-server state:D stack: 0 pid: 938 ppid: 1 flags:0x00000000\nCall Trace:\n \u003cTASK\u003e\n __schedule+0x2d6/0x10c0\n ? __mod_memcg_state+0x4d/0x70\n ? csum_partial+0xd/0x20\n ? _raw_spin_lock_irqsave+0x26/0x50\n schedule+0x4e/0xc0\n __lock_sock+0x69/0x90\n ? do_wait_intr_irq+0xa0/0xa0\n __lock_sock_fast+0x35/0x50\n mptcp_sockopt_sync_all+0x38/0xc0\n __mptcp_push_pending+0x105/0x200\n mptcp_sendmsg+0x466/0x490\n sock_sendmsg+0x57/0x60\n __sys_sendto+0xf0/0x160\n ? do_wait_intr_irq+0xa0/0xa0\n ? fpregs_restore_userregs+0x12/0xd0\n __x64_sys_sendto+0x20/0x30\n do_syscall_64+0x38/0x90\n entry_SYSCALL_64_after_hwframe+0x44/0xae\nRIP: 0033:0x7f9ba546c2d0\nRSP: 002b:00007ffdc3b762d8 EFLAGS: 00000246 ORIG_RAX: 000000000000002c\nRAX: ffffffffffffffda RBX: 00007f9ba56c8060 RCX: 00007f9ba546c2d0\nRDX: 000000000000077a RSI: 0000000000e5e180 RDI: 0000000000000234\nRBP: 0000000000cc57f0 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 00007f9ba56c8060\nR13: 0000000000b6ba60 R14: 0000000000cc7840 R15: 41d8685b1d7901b8\n \u003c/TASK\u003e\n\nFix the issue by using __mptcp_flush_join_list() instead of plain\nmptcp_flush_join_list() inside __mptcp_push_pending(), as suggested by\nFlorian. The sockopt sync will be deferred to the workqueue.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: mptcp: fix deadlock in __mptcp_push_pending()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-47590" }, { "category": "external", "summary": "RHBZ#2293237", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293237" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-47590", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47590" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47590", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47590" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2024061919-CVE-2021-47590-6db0@gregkh/T", "url": "https://lore.kernel.org/linux-cve-announce/2024061919-CVE-2021-47590-6db0@gregkh/T" } ], "release_date": "2024-06-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:58:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1988" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: mptcp: fix deadlock in __mptcp_push_pending()" }, { "cve": "CVE-2021-47614", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2024-06-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2293265" } ], "notes": [ { "category": "description", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/irdma: Fix a user-after-free in add_pble_prm\n\nWhen irdma_hmc_sd_one fails, \u0027chunk\u0027 is freed while its still on the PBLE\ninfo list.\n\nAdd the chunk entry to the PBLE info list only after successful setting of\nthe SD in irdma_hmc_sd_one.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: RDMA/irdma: Fix a user-after-free in add_pble_prm", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-47614" }, { "category": "external", "summary": "RHBZ#2293265", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293265" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-47614", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47614" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47614", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47614" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2024061908-CVE-2021-47614-6dd2@gregkh/T", "url": "https://lore.kernel.org/linux-cve-announce/2024061908-CVE-2021-47614-6dd2@gregkh/T" } ], "release_date": "2024-06-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:58:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1988" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: RDMA/irdma: Fix a user-after-free in add_pble_prm" }, { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2022-0001", "discovery_date": "2022-03-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2061712" } ], "notes": [ { "category": "description", "text": "A flaw was found in hw. The Branch History Injection (BHI) describes a specific form of intra-mode BTI. This flaw allows an unprivileged attacker to manipulate the branch history before transitioning to supervisor or VMX root mode. This issue is an effort to cause an indirect branch predictor to select a specific predictor entry for an indirect branch, and a disclosure gadget at the predicted target will transiently execute. This execution is possible since the relevant branch history may contain branches taken in previous security contexts, and in particular, in other predictor modes.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: cpu: intel: Branch History Injection (BHI)", "title": "Vulnerability summary" }, { "category": "other", "text": "The current known mechanisms to exploit this issue rely on unprivileged eBPF functionality. Unprivileged eBPF is disabled by default on Red Hat Enterprise Linux.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0001" }, { "category": "external", "summary": "RHBZ#2061712", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061712" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0001", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0001" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0001", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0001" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html", "url": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html" }, { "category": "external", "summary": "https://www.vusec.net/projects/bhi-spectre-bhb/", "url": "https://www.vusec.net/projects/bhi-spectre-bhb/" } ], "release_date": "2022-03-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:58:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1988" }, { "category": "workaround", "details": "Disabling unprivileged eBPF effectively mitigates the known attack vectors for exploiting intra-mode branch injections attacks.\n\nThe default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl.\n\nFor the Red Hat Enterprise Linux 7, the eBPF for unprivileged users is always disabled.\n\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nContinue to enable SMEP and Enhanced IBRS. This is the default setting on eligible CPUs.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: cpu: intel: Branch History Injection (BHI)" }, { "acknowledgments": [ { "names": [ "Intel" ] } ], "cve": "CVE-2022-0002", "discovery_date": "2022-03-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2061721" } ], "notes": [ { "category": "description", "text": "A flaw was found in hw. The Intra-mode BTI refers to a variant of Branch Target Injection aka SpectreV2 (BTI) where an indirect branch speculates to an aliased predictor entry for a different indirect branch in the same predictor mode, and a disclosure gadget at the predicted target transiently executes. These predictor entries may contain targets corresponding to the targets of an indirect near jump, indirect near call, and near return instructions, even if these branches were only transiently executed. The managed runtimes provide an attacker with the means to create the aliasing required for intra-mode BTI attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: cpu: intel: Intra-Mode BTI", "title": "Vulnerability summary" }, { "category": "other", "text": "The current known mechanisms to exploit this issue rely on unprivileged eBPF functionality. Unprivileged eBPF is disabled by default on Red Hat Enterprise Linux.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0002" }, { "category": "external", "summary": "RHBZ#2061721", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061721" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0002", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0002" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0002", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0002" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html", "url": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html" }, { "category": "external", "summary": "https://www.vusec.net/projects/bhi-spectre-bhb/", "url": "https://www.vusec.net/projects/bhi-spectre-bhb/" } ], "release_date": "2022-03-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:58:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1988" }, { "category": "workaround", "details": "Disabling unprivileged eBPF effectively mitigates the known attack vectors for exploiting intra-mode branch injections attacks.\n\nThe default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\n\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nContinue to enable SMEP and Enhanced IBRS. This is the default setting on eligible CPUs.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "hw: cpu: intel: Intra-Mode BTI" }, { "acknowledgments": [ { "names": [ "De4dCr0w" ], "organization": "360 Vulnerability Research Institute" } ], "cve": "CVE-2022-0286", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2022-01-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2037019" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u2019s bonding driver in the way a user bonds non existing or fake device. This flaw allows a local user to crash the system, causing a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Local denial of service in bond_ipsec_add_sa", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0286" }, { "category": "external", "summary": "RHBZ#2037019", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037019" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0286", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0286" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0286", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0286" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=105cd17a866017b45f3c45901b394c711c97bf40", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=105cd17a866017b45f3c45901b394c711c97bf40" } ], "release_date": "2021-07-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:58:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1988" }, { "category": "workaround", "details": "To mitigate this issue, prevent the module bonding from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Local denial of service in bond_ipsec_add_sa" }, { "cve": "CVE-2022-0322", "cwe": { "id": "CWE-681", "name": "Incorrect Conversion between Numeric Types" }, "discovery_date": "2021-12-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2042822" } ], "notes": [ { "category": "description", "text": "A flaw was found in the sctp_make_strreset_req function in net/sctp/sm_make_chunk.c in the SCTP network protocol in the Linux kernel with a local user privilege access. In this flaw, an attempt to use more buffer than is allocated triggers a BUG_ON issue, leading to a denial of service (DOS).", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0322" }, { "category": "external", "summary": "RHBZ#2042822", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042822" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0322", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0322" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0322", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0322" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2d859e3fc97e79d907761550dbc03ff1b36479c", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2d859e3fc97e79d907761550dbc03ff1b36479c" } ], "release_date": "2021-10-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:58:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1988" }, { "category": "workaround", "details": "Mitigation for this issue is to skip loading the affected module SCTP onto the system. Until we have a fix available, this can be done by a blacklist mechanism and will ensure the driver is not loaded at the boot time.\n~~~\nHow do I blacklist a kernel module to prevent it from loading automatically?\nhttps://access.redhat.com/solutions/41278 \n~~~", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c" }, { "acknowledgments": [ { "names": [ "elijahbai" ], "organization": "Tencent Security Yunding Lab" } ], "cve": "CVE-2022-0850", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-11-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2060606" } ], "notes": [ { "category": "description", "text": "An information leak flaw was found via ext4_extent_header in fs/ext4/extents.c in the Linux kernel. This flaw could allow a local attacker to cause a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: information leak in copy_page_to_iter() in iov_iter.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0850" }, { "category": "external", "summary": "RHBZ#2060606", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2060606" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0850", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0850" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0850", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0850" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ce3aba43599f0b50adbebff133df8d08a3d5fffe", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ce3aba43599f0b50adbebff133df8d08a3d5fffe" }, { "category": "external", "summary": "https://syzkaller.appspot.com/bug?id=78e9ad0e6952a3ca16e8234724b2fa92d041b9b8", "url": "https://syzkaller.appspot.com/bug?id=78e9ad0e6952a3ca16e8234724b2fa92d041b9b8" } ], "release_date": "2021-05-06T19:30:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:58:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1988" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: information leak in copy_page_to_iter() in iov_iter.c" }, { "acknowledgments": [ { "names": [ "Miklos Szeredi", "Jann Horn" ] } ], "cve": "CVE-2022-1011", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064855" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the Linux kernel\u2019s FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes", "title": "Vulnerability summary" }, { "category": "other", "text": "For the Red Hat Enterprise Linux the issue actual if fuse or fuse3 package is installed on the system and only privileged user can install it.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1011" }, { "category": "external", "summary": "RHBZ#2064855", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064855" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1011", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1011" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1011", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1011" }, { "category": "external", "summary": "https://lore.kernel.org/lkml/20220414110839.241541230@linuxfoundation.org/", "url": "https://lore.kernel.org/lkml/20220414110839.241541230@linuxfoundation.org/" } ], "release_date": "2022-03-07T10:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:58:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1988" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes" }, { "acknowledgments": [ { "names": [ "Jiasheng Jiang" ] } ], "cve": "CVE-2022-3105", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2022-12-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2153067" } ], "notes": [ { "category": "description", "text": "An issue was discovered in the Linux kernel through 5.16-rc6. uapi_finalize in drivers/infiniband/core/uverbs_uapi.c lacks check of kmalloc_array().", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: RDMA/uverbs: NULL pointer dereference in uapi_finalize()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-3105" }, { "category": "external", "summary": "RHBZ#2153067", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153067" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3105", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3105" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3105", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3105" } ], "release_date": "2022-12-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:58:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1988" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: RDMA/uverbs: NULL pointer dereference in uapi_finalize()" }, { "acknowledgments": [ { "names": [ "Jiasheng Jiang" ] } ], "cve": "CVE-2022-3106", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2022-12-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2153066" } ], "notes": [ { "category": "description", "text": "An issue was discovered in the Linux kernel through 5.16-rc6. ef100_update_stats in drivers/net/ethernet/sfc/ef100_nic.c lacks check of the return value of kmalloc().", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: sfc_ef100: NULL pointer dereference in ef100_update_stats()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-3106" }, { "category": "external", "summary": "RHBZ#2153066", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153066" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3106", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3106" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3106", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3106" } ], "release_date": "2022-12-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:58:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1988" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: sfc_ef100: NULL pointer dereference in ef100_update_stats()" }, { "acknowledgments": [ { "names": [ "Jiasheng Jiang" ] } ], "cve": "CVE-2022-3108", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2022-12-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2153052" } ], "notes": [ { "category": "description", "text": "An issue was discovered in the Linux kernel through 5.16-rc6. kfd_parse_subtype_iolink in drivers/gpu/drm/amd/amdkfd/kfd_crat.c lacks check of the return value of kmemdup().", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: drm/amdkfd: NULL pointer dereference in kfd_parse_subtype_iolink()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-3108" }, { "category": "external", "summary": "RHBZ#2153052", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153052" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-3108", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3108" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3108", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3108" } ], "release_date": "2022-12-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:58:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1988" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: drm/amdkfd: NULL pointer dereference in kfd_parse_subtype_iolink()" }, { "cve": "CVE-2022-48771", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2024-06-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2293337" } ], "notes": [ { "category": "description", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix stale file descriptors on failed usercopy\n\nA failing usercopy of the fence_rep object will lead to a stale entry in\nthe file descriptor table as put_unused_fd() won\u0027t release it. This\nenables userland to refer to a dangling \u0027file\u0027 object through that still\nvalid file descriptor, leading to all kinds of use-after-free\nexploitation scenarios.\n\nFix this by deferring the call to fd_install() until after the usercopy\nhas succeeded.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: drm/vmwgfx: Fix stale file descriptors on failed usercopy", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-48771" }, { "category": "external", "summary": "RHBZ#2293337", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293337" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-48771", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48771" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48771", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48771" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2024062011-CVE-2022-48771-2c90@gregkh/T", "url": "https://lore.kernel.org/linux-cve-announce/2024062011-CVE-2022-48771-2c90@gregkh/T" } ], "release_date": "2024-06-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:58:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1988" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: drm/vmwgfx: Fix stale file descriptors on failed usercopy" }, { "cve": "CVE-2022-48904", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2024-08-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2307157" } ], "notes": [ { "category": "description", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/amd: Fix I/O page table memory leak\n\nThe current logic updates the I/O page table mode for the domain\nbefore calling the logic to free memory used for the page table.\nThis results in IOMMU page table memory leak, and can be observed\nwhen launching VM w/ pass-through devices.\n\nFix by freeing the memory used for page table before updating the mode.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: iommu/amd: Fix I/O page table memory leak", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is fixed in RHEL-8.6 and above (including RHEL 8.10)\n~~~\nin (rhel-8.6, rhel-8.7, rhel-8.8, rhel-8.9, rhel-8.10) iommu/amd: Fix I/O page table memory leak\n~~~", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-48904" }, { "category": "external", "summary": "RHBZ#2307157", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2307157" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-48904", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48904" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48904", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48904" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2024082212-CVE-2022-48904-b02c@gregkh/T", "url": "https://lore.kernel.org/linux-cve-announce/2024082212-CVE-2022-48904-b02c@gregkh/T" } ], "release_date": "2024-08-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:58:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1988" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: iommu/amd: Fix I/O page table memory leak" }, { "cve": "CVE-2023-0459", "cwe": { "id": "CWE-402", "name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)" }, "discovery_date": "2023-06-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2216383" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in copy_from_user in 64-bit versions of the Linux kernel. This flaw allows a local attacker to bypass the \"access_ok\" sanity check and pass a kernel pointer to copy_from_user(), resulting in kernel data leaking.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Copy_from_user on 64-bit versions may leak kernel information", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-0459" }, { "category": "external", "summary": "RHBZ#2216383", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216383" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-0459", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0459" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0459", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0459" }, { "category": "external", "summary": "https://github.com/torvalds/linux/commit/4b842e4e25b12951fa10dedb4bc16bc47e3b850c", "url": "https://github.com/torvalds/linux/commit/4b842e4e25b12951fa10dedb4bc16bc47e3b850c" } ], "release_date": "2020-02-15T06:30:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T13:58:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:1988" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src", "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x", "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: Copy_from_user on 64-bit versions may leak kernel information" } ] }
wid-sec-w-2024-0794
Vulnerability from csaf_certbund
Published
2024-04-04 22:00
Modified
2024-04-04 22:00
Summary
Dell ECS: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Dell ECS ist ein Objektspeichersystem.
Angriff
Ein Angreifer kann mehrere Schwachstellen in Dell ECS ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
Betroffene Betriebssysteme
- Linux
- UNIX
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Dell ECS ist ein Objektspeichersystem.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Dell ECS ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0794 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0794.json" }, { "category": "self", "summary": "WID-SEC-2024-0794 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0794" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-141 vom 2024-04-04", "url": "https://www.dell.com/support/kbdoc/000223839/dsa-2024-=" } ], "source_lang": "en-US", "title": "Dell ECS: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-04-04T22:00:00.000+00:00", "generator": { "date": "2024-04-05T09:37:24.604+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-0794", "initial_release_date": "2024-04-04T22:00:00.000+00:00", "revision_history": [ { "date": "2024-04-04T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c 3.8.1.0", "product": { "name": "Dell ECS \u003c 3.8.1.0", "product_id": "T033919", "product_identification_helper": { "cpe": "cpe:/h:dell:ecs:3.8.1.0" } } } ], "category": "product_name", "name": "ECS" } ], "category": "vendor", "name": "Dell" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-18074", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2018-18074" }, { "cve": "CVE-2020-10663", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10663" }, { "cve": "CVE-2020-10672", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10672" }, { "cve": "CVE-2020-10673", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10673" }, { "cve": "CVE-2020-10735", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10735" }, { "cve": "CVE-2020-10968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10968" }, { "cve": "CVE-2020-10969", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10969" }, { "cve": "CVE-2020-11111", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11111" }, { "cve": "CVE-2020-11112", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11112" }, { "cve": "CVE-2020-11113", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11113" }, { "cve": "CVE-2020-11612", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11612" }, { "cve": "CVE-2020-11619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11619" }, { "cve": "CVE-2020-11620", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11620" }, { "cve": "CVE-2020-11979", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11979" }, { "cve": "CVE-2020-12762", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-12762" }, { "cve": "CVE-2020-12825", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-12825" }, { "cve": "CVE-2020-13956", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-13956" }, { "cve": "CVE-2020-14060", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14060" }, { "cve": "CVE-2020-14061", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14061" }, { "cve": "CVE-2020-14062", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14062" }, { "cve": "CVE-2020-14195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14195" }, { "cve": "CVE-2020-15250", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-15250" }, { "cve": "CVE-2020-1945", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-1945" }, { "cve": "CVE-2020-1967", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-1967" }, { "cve": "CVE-2020-1971", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-1971" }, { "cve": "CVE-2020-24616", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-24616" }, { "cve": "CVE-2020-24750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-24750" }, { "cve": "CVE-2020-25649", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-25649" }, { "cve": "CVE-2020-25658", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-25658" }, { "cve": "CVE-2020-26116", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-26116" }, { "cve": "CVE-2020-26137", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-26137" }, { "cve": "CVE-2020-26541", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-26541" }, { "cve": "CVE-2020-27216", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-27216" }, { "cve": "CVE-2020-27218", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-27218" }, { "cve": "CVE-2020-27223", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-27223" }, { "cve": "CVE-2020-28366", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-28366" }, { "cve": "CVE-2020-28493", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-28493" }, { "cve": "CVE-2020-29509", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29509" }, { "cve": "CVE-2020-29511", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29511" }, { "cve": "CVE-2020-29582", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29582" }, { "cve": "CVE-2020-29651", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29651" }, { "cve": "CVE-2020-35490", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-35490" }, { "cve": "CVE-2020-35491", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-35491" }, { "cve": "CVE-2020-35728", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-35728" }, { "cve": "CVE-2020-36179", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36179" }, { "cve": "CVE-2020-36180", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36180" }, { "cve": "CVE-2020-36181", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36181" }, { "cve": "CVE-2020-36182", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36182" }, { "cve": "CVE-2020-36183", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36183" }, { "cve": "CVE-2020-36184", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36184" }, { "cve": "CVE-2020-36185", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36185" }, { "cve": "CVE-2020-36186", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36186" }, { "cve": "CVE-2020-36187", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36187" }, { "cve": "CVE-2020-36188", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36188" }, { "cve": "CVE-2020-36189", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36189" }, { "cve": "CVE-2020-36516", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36516" }, { "cve": "CVE-2020-36518", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36518" }, { "cve": "CVE-2020-36557", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36557" }, { "cve": "CVE-2020-36558", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36558" }, { "cve": "CVE-2020-36691", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36691" }, { "cve": "CVE-2020-7238", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-7238" }, { "cve": "CVE-2020-8840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8840" }, { "cve": "CVE-2020-8908", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8908" }, { "cve": "CVE-2020-8911", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8911" }, { "cve": "CVE-2020-8912", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8912" }, { "cve": "CVE-2020-9488", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9488" }, { "cve": "CVE-2020-9493", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9493" }, { "cve": "CVE-2020-9546", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9546" }, { "cve": "CVE-2020-9547", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9547" }, { "cve": "CVE-2020-9548", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9548" }, { "cve": "CVE-2021-20190", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-20190" }, { "cve": "CVE-2021-20323", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-20323" }, { "cve": "CVE-2021-21290", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-21290" }, { "cve": "CVE-2021-21295", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-21295" }, { "cve": "CVE-2021-21409", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-21409" }, { "cve": "CVE-2021-23840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-23840" }, { "cve": "CVE-2021-23841", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-23841" }, { "cve": "CVE-2021-2471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-2471" }, { "cve": "CVE-2021-25642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-25642" }, { "cve": "CVE-2021-26341", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-26341" }, { "cve": "CVE-2021-27918", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-27918" }, { "cve": "CVE-2021-28153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28153" }, { "cve": "CVE-2021-28165", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28165" }, { "cve": "CVE-2021-28169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28169" }, { "cve": "CVE-2021-28861", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28861" }, { "cve": "CVE-2021-29425", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-29425" }, { "cve": "CVE-2021-30560", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-30560" }, { "cve": "CVE-2021-3114", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3114" }, { "cve": "CVE-2021-33036", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33036" }, { "cve": "CVE-2021-33194", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33194" }, { "cve": "CVE-2021-33195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33195" }, { "cve": "CVE-2021-33196", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33196" }, { "cve": "CVE-2021-33197", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33197" }, { "cve": "CVE-2021-33503", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33503" }, { "cve": "CVE-2021-33655", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33655" }, { "cve": "CVE-2021-33656", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33656" }, { "cve": "CVE-2021-3424", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3424" }, { "cve": "CVE-2021-34428", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-34428" }, { "cve": "CVE-2021-3449", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3449" }, { "cve": "CVE-2021-3450", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3450" }, { "cve": "CVE-2021-3530", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3530" }, { "cve": "CVE-2021-36221", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36221" }, { "cve": "CVE-2021-36373", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36373" }, { "cve": "CVE-2021-36374", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36374" }, { "cve": "CVE-2021-3648", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3648" }, { "cve": "CVE-2021-36690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36690" }, { "cve": "CVE-2021-3711", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3711" }, { "cve": "CVE-2021-3712", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3712" }, { "cve": "CVE-2021-37136", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37136" }, { "cve": "CVE-2021-37137", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37137" }, { "cve": "CVE-2021-37404", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37404" }, { "cve": "CVE-2021-37533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37533" }, { "cve": "CVE-2021-3754", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3754" }, { "cve": "CVE-2021-3778", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3778" }, { "cve": "CVE-2021-3796", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3796" }, { "cve": "CVE-2021-3826", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3826" }, { "cve": "CVE-2021-3827", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3827" }, { "cve": "CVE-2021-38297", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-38297" }, { "cve": "CVE-2021-3872", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3872" }, { "cve": "CVE-2021-3875", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3875" }, { "cve": "CVE-2021-3903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3903" }, { "cve": "CVE-2021-3923", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3923" }, { "cve": "CVE-2021-3927", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3927" }, { "cve": "CVE-2021-3928", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3928" }, { "cve": "CVE-2021-3968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3968" }, { "cve": "CVE-2021-3973", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3973" }, { "cve": "CVE-2021-3974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3974" }, { "cve": "CVE-2021-3984", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3984" }, { "cve": "CVE-2021-4019", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4019" }, { "cve": "CVE-2021-4037", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4037" }, { "cve": "CVE-2021-4069", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4069" }, { "cve": "CVE-2021-4104", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4104" }, { "cve": "CVE-2021-4136", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4136" }, { "cve": "CVE-2021-4157", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4157" }, { "cve": "CVE-2021-4166", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4166" }, { "cve": "CVE-2021-41771", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-41771" }, { "cve": "CVE-2021-4192", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4192" }, { "cve": "CVE-2021-4193", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4193" }, { "cve": "CVE-2021-4203", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4203" }, { "cve": "CVE-2021-42567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-42567" }, { "cve": "CVE-2021-43797", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-43797" }, { "cve": "CVE-2021-44531", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44531" }, { "cve": "CVE-2021-44532", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44532" }, { "cve": "CVE-2021-44533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44533" }, { "cve": "CVE-2021-44716", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44716" }, { "cve": "CVE-2021-44878", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44878" }, { "cve": "CVE-2021-45078", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-45078" }, { "cve": "CVE-2021-46195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-46195" }, { "cve": "CVE-2021-46828", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-46828" }, { "cve": "CVE-2021-46848", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-46848" }, { "cve": "CVE-2022-0128", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0128" }, { "cve": "CVE-2022-0213", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0213" }, { "cve": "CVE-2022-0225", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0225" }, { "cve": "CVE-2022-0261", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0261" }, { "cve": "CVE-2022-0318", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0318" }, { "cve": "CVE-2022-0319", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0319" }, { "cve": "CVE-2022-0351", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0351" }, { "cve": "CVE-2022-0359", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0359" }, { "cve": "CVE-2022-0361", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0361" }, { "cve": "CVE-2022-0392", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0392" }, { "cve": "CVE-2022-0407", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0407" }, { "cve": "CVE-2022-0413", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0413" }, { "cve": "CVE-2022-0561", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0561" }, { "cve": "CVE-2022-0696", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0696" }, { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-1184", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1184" }, { "cve": "CVE-2022-1245", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1245" }, { "cve": "CVE-2022-1271", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1271" }, { "cve": "CVE-2022-1292", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1292" }, { "cve": "CVE-2022-1381", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1381" }, { "cve": "CVE-2022-1420", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1420" }, { "cve": "CVE-2022-1462", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1462" }, { "cve": "CVE-2022-1466", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1466" }, { "cve": "CVE-2022-1471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1471" }, { "cve": "CVE-2022-1586", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1586" }, { "cve": "CVE-2022-1587", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1587" }, { "cve": "CVE-2022-1616", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1616" }, { "cve": "CVE-2022-1619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1619" }, { "cve": "CVE-2022-1620", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1620" }, { "cve": "CVE-2022-1679", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1679" }, { "cve": "CVE-2022-1705", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1705" }, { "cve": "CVE-2022-1720", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1720" }, { "cve": "CVE-2022-1729", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1729" }, { "cve": "CVE-2022-1733", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1733" }, { "cve": "CVE-2022-1735", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1735" }, { "cve": "CVE-2022-1771", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1771" }, { "cve": "CVE-2022-1785", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1785" }, { "cve": "CVE-2022-1796", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1796" }, { "cve": "CVE-2022-1851", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1851" }, { "cve": "CVE-2022-1897", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1897" }, { "cve": "CVE-2022-1898", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1898" }, { "cve": "CVE-2022-1927", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1927" }, { "cve": "CVE-2022-1962", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1962" }, { "cve": "CVE-2022-1968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1968" }, { "cve": "CVE-2022-1974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1974" }, { "cve": "CVE-2022-1975", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1975" }, { "cve": "CVE-2022-20132", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20132" }, { "cve": "CVE-2022-20141", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20141" }, { "cve": "CVE-2022-20154", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20154" }, { "cve": "CVE-2022-20166", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20166" }, { "cve": "CVE-2022-20368", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20368" }, { "cve": "CVE-2022-20369", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20369" }, { "cve": "CVE-2022-2047", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2047" }, { "cve": "CVE-2022-2048", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2048" }, { "cve": "CVE-2022-20567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20567" }, { "cve": "CVE-2022-2068", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2068" }, { "cve": "CVE-2022-2097", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2097" }, { "cve": "CVE-2022-21216", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21216" }, { "cve": "CVE-2022-21233", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21233" }, { "cve": "CVE-2022-2124", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2124" }, { "cve": "CVE-2022-2125", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2125" }, { "cve": "CVE-2022-2126", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2126" }, { "cve": "CVE-2022-2129", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2129" }, { "cve": "CVE-2022-21363", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21363" }, { "cve": "CVE-2022-21385", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21385" }, { "cve": "CVE-2022-21499", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21499" }, { "cve": "CVE-2022-2153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2153" }, { "cve": "CVE-2022-21540", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21540" }, { "cve": "CVE-2022-21541", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21541" }, { "cve": "CVE-2022-21549", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21549" }, { "cve": "CVE-2022-21618", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21618" }, { "cve": "CVE-2022-21619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21619" }, { "cve": "CVE-2022-21624", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21624" }, { "cve": "CVE-2022-21626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21626" }, { "cve": "CVE-2022-21628", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21628" }, { "cve": "CVE-2022-21702", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21702" }, { "cve": "CVE-2022-2175", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2175" }, { "cve": "CVE-2022-2182", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2182" }, { "cve": "CVE-2022-2183", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2183" }, { "cve": "CVE-2022-2206", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2206" }, { "cve": "CVE-2022-2207", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2207" }, { "cve": "CVE-2022-2208", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2208" }, { "cve": "CVE-2022-2210", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2210" }, { "cve": "CVE-2022-2231", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2231" }, { "cve": "CVE-2022-2256", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2256" }, { "cve": "CVE-2022-2257", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2257" }, { "cve": "CVE-2022-2264", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2264" }, { "cve": "CVE-2022-2284", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2284" }, { "cve": "CVE-2022-2285", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2285" }, { "cve": "CVE-2022-2286", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2286" }, { "cve": "CVE-2022-2287", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2287" }, { "cve": "CVE-2022-22976", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-22976" }, { "cve": "CVE-2022-22978", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-22978" }, { "cve": "CVE-2022-2304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2304" }, { "cve": "CVE-2022-2318", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2318" }, { "cve": "CVE-2022-23302", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23302" }, { "cve": "CVE-2022-23305", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23305" }, { "cve": "CVE-2022-23307", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23307" }, { "cve": "CVE-2022-2343", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2343" }, { "cve": "CVE-2022-2344", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2344" }, { "cve": "CVE-2022-2345", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2345" }, { "cve": "CVE-2022-23471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23471" }, { "cve": "CVE-2022-23521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23521" }, { "cve": "CVE-2022-23772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23772" }, { "cve": "CVE-2022-23773", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23773" }, { "cve": "CVE-2022-24302", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24302" }, { "cve": "CVE-2022-24329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24329" }, { "cve": "CVE-2022-24823", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24823" }, { "cve": "CVE-2022-24903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24903" }, { "cve": "CVE-2022-2503", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2503" }, { "cve": "CVE-2022-25147", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25147" }, { "cve": "CVE-2022-25168", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25168" }, { "cve": "CVE-2022-2519", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2519" }, { "cve": "CVE-2022-2520", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2520" }, { "cve": "CVE-2022-2521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2521" }, { "cve": "CVE-2022-2522", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2522" }, { "cve": "CVE-2022-25647", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25647" }, { "cve": "CVE-2022-2571", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2571" }, { "cve": "CVE-2022-2580", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2580" }, { "cve": "CVE-2022-2581", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2581" }, { "cve": "CVE-2022-25857", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25857" }, { "cve": "CVE-2022-2588", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2588" }, { "cve": "CVE-2022-2598", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2598" }, { "cve": "CVE-2022-26148", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26148" }, { "cve": "CVE-2022-26365", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26365" }, { "cve": "CVE-2022-26373", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26373" }, { "cve": "CVE-2022-2639", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2639" }, { "cve": "CVE-2022-26612", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26612" }, { "cve": "CVE-2022-2663", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2663" }, { "cve": "CVE-2022-27781", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-27781" }, { "cve": "CVE-2022-27782", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-27782" }, { "cve": "CVE-2022-27943", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-27943" }, { "cve": "CVE-2022-2795", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2795" }, { "cve": "CVE-2022-28131", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28131" }, { "cve": "CVE-2022-2816", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2816" }, { "cve": "CVE-2022-2817", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2817" }, { "cve": "CVE-2022-2819", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2819" }, { "cve": "CVE-2022-28327", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28327" }, { "cve": "CVE-2022-2845", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2845" }, { "cve": "CVE-2022-2849", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2849" }, { "cve": "CVE-2022-2862", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2862" }, { "cve": "CVE-2022-2867", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2867" }, { "cve": "CVE-2022-2868", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2868" }, { "cve": "CVE-2022-2869", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2869" }, { "cve": "CVE-2022-28693", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28693" }, { "cve": "CVE-2022-2874", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2874" }, { "cve": "CVE-2022-28748", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28748" }, { "cve": "CVE-2022-2880", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2880" }, { "cve": "CVE-2022-2889", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2889" }, { "cve": "CVE-2022-29162", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29162" }, { "cve": "CVE-2022-29187", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29187" }, { "cve": "CVE-2022-2923", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2923" }, { "cve": "CVE-2022-2946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2946" }, { "cve": "CVE-2022-29526", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29526" }, { "cve": "CVE-2022-29583", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29583" }, { "cve": "CVE-2022-2964", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2964" }, { "cve": "CVE-2022-2977", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2977" }, { "cve": "CVE-2022-2980", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2980" }, { "cve": "CVE-2022-2982", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2982" }, { "cve": "CVE-2022-29900", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29900" }, { "cve": "CVE-2022-29901", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29901" }, { "cve": "CVE-2022-2991", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2991" }, { "cve": "CVE-2022-3016", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3016" }, { "cve": "CVE-2022-3028", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3028" }, { "cve": "CVE-2022-3037", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3037" }, { "cve": "CVE-2022-30580", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30580" }, { "cve": "CVE-2022-30630", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30630" }, { "cve": "CVE-2022-30631", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30631" }, { "cve": "CVE-2022-30632", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30632" }, { "cve": "CVE-2022-30633", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30633" }, { "cve": "CVE-2022-3099", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3099" }, { "cve": "CVE-2022-31030", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-31030" }, { "cve": "CVE-2022-31159", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-31159" }, { "cve": "CVE-2022-3134", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3134" }, { "cve": "CVE-2022-3153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3153" }, { "cve": "CVE-2022-3169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3169" }, { "cve": "CVE-2022-31690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-31690" }, { "cve": "CVE-2022-32148", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32148" }, { "cve": "CVE-2022-32149", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32149" }, { "cve": "CVE-2022-32206", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32206" }, { "cve": "CVE-2022-32208", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32208" }, { "cve": "CVE-2022-32221", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32221" }, { "cve": "CVE-2022-3234", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3234" }, { "cve": "CVE-2022-3235", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3235" }, { "cve": "CVE-2022-3239", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3239" }, { "cve": "CVE-2022-3278", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3278" }, { "cve": "CVE-2022-3296", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3296" }, { "cve": "CVE-2022-3297", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3297" }, { "cve": "CVE-2022-33196", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33196" }, { "cve": "CVE-2022-3324", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3324" }, { "cve": "CVE-2022-3352", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3352" }, { "cve": "CVE-2022-33740", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33740" }, { "cve": "CVE-2022-33741", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33741" }, { "cve": "CVE-2022-33742", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33742" }, { "cve": "CVE-2022-33972", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33972" }, { "cve": "CVE-2022-33981", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33981" }, { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34169" }, { "cve": "CVE-2022-3424", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3424" }, { "cve": "CVE-2022-34266", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34266" }, { "cve": "CVE-2022-34526", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34526" }, { "cve": "CVE-2022-34903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34903" }, { "cve": "CVE-2022-3491", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3491" }, { "cve": "CVE-2022-3515", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3515" }, { "cve": "CVE-2022-3520", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3520" }, { "cve": "CVE-2022-3521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3521" }, { "cve": "CVE-2022-3524", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3524" }, { "cve": "CVE-2022-35252", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-35252" }, { "cve": "CVE-2022-3542", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3542" }, { "cve": "CVE-2022-3545", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3545" }, { "cve": "CVE-2022-3564", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3564" }, { "cve": "CVE-2022-3565", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3565" }, { "cve": "CVE-2022-3566", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3566" }, { "cve": "CVE-2022-3567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3567" }, { "cve": "CVE-2022-35737", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-35737" }, { "cve": "CVE-2022-3586", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3586" }, { "cve": "CVE-2022-3591", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3591" }, { "cve": "CVE-2022-3594", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3594" }, { "cve": "CVE-2022-3597", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3597" }, { "cve": "CVE-2022-3599", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3599" }, { "cve": "CVE-2022-36109", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36109" }, { "cve": "CVE-2022-3621", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3621" }, { "cve": "CVE-2022-3626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3626" }, { "cve": "CVE-2022-3627", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3627" }, { "cve": "CVE-2022-3628", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3628" }, { "cve": "CVE-2022-36280", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36280" }, { "cve": "CVE-2022-3629", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3629" }, { "cve": "CVE-2022-3635", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3635" }, { "cve": "CVE-2022-3643", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3643" }, { "cve": "CVE-2022-36437", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36437" }, { "cve": "CVE-2022-3646", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3646" }, { "cve": "CVE-2022-3649", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3649" }, { "cve": "CVE-2022-36760", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36760" }, { "cve": "CVE-2022-36879", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36879" }, { "cve": "CVE-2022-36946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36946" }, { "cve": "CVE-2022-3705", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3705" }, { "cve": "CVE-2022-37434", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37434" }, { "cve": "CVE-2022-37436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37436" }, { "cve": "CVE-2022-37865", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37865" }, { "cve": "CVE-2022-37866", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37866" }, { "cve": "CVE-2022-38090", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38090" }, { "cve": "CVE-2022-38096", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38096" }, { "cve": "CVE-2022-38126", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38126" }, { "cve": "CVE-2022-38127", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38127" }, { "cve": "CVE-2022-38177", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38177" }, { "cve": "CVE-2022-38178", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38178" }, { "cve": "CVE-2022-3821", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3821" }, { "cve": "CVE-2022-38533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38533" }, { "cve": "CVE-2022-38749", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38749" }, { "cve": "CVE-2022-38750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38750" }, { "cve": "CVE-2022-38751", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38751" }, { "cve": "CVE-2022-38752", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38752" }, { "cve": "CVE-2022-39028", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-39028" }, { "cve": "CVE-2022-3903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3903" }, { "cve": "CVE-2022-39188", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-39188" }, { "cve": "CVE-2022-39399", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-39399" }, { "cve": "CVE-2022-3970", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3970" }, { "cve": "CVE-2022-40149", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40149" }, { "cve": "CVE-2022-40150", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40150" }, { "cve": "CVE-2022-40151", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40151" }, { "cve": "CVE-2022-40152", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40152" }, { "cve": "CVE-2022-40153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40153" }, { "cve": "CVE-2022-40303", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40303" }, { "cve": "CVE-2022-40304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40304" }, { "cve": "CVE-2022-40307", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40307" }, { "cve": "CVE-2022-40674", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40674" }, { "cve": "CVE-2022-40768", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40768" }, { "cve": "CVE-2022-40899", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40899" }, { "cve": "CVE-2022-4095", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4095" }, { "cve": "CVE-2022-41218", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41218" }, { "cve": "CVE-2022-4129", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4129" }, { "cve": "CVE-2022-4141", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4141" }, { "cve": "CVE-2022-41717", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41717" }, { "cve": "CVE-2022-41721", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41721" }, { "cve": "CVE-2022-41848", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41848" }, { "cve": "CVE-2022-41850", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41850" }, { "cve": "CVE-2022-41854", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41854" }, { "cve": "CVE-2022-41858", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41858" }, { "cve": "CVE-2022-41881", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41881" }, { "cve": "CVE-2022-41903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41903" }, { "cve": "CVE-2022-41915", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41915" }, { "cve": "CVE-2022-41966", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41966" }, { "cve": "CVE-2022-41974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41974" }, { "cve": "CVE-2022-42003", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42003" }, { "cve": "CVE-2022-42004", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42004" }, { "cve": "CVE-2022-42010", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42010" }, { "cve": "CVE-2022-42011", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42011" }, { "cve": "CVE-2022-42012", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42012" }, { "cve": "CVE-2022-42328", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42328" }, { "cve": "CVE-2022-42329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42329" }, { "cve": "CVE-2022-42703", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42703" }, { "cve": "CVE-2022-42889", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42889" }, { "cve": "CVE-2022-42895", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42895" }, { "cve": "CVE-2022-42896", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42896" }, { "cve": "CVE-2022-42898", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42898" }, { "cve": "CVE-2022-4292", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4292" }, { "cve": "CVE-2022-4293", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4293" }, { "cve": "CVE-2022-42969", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42969" }, { "cve": "CVE-2022-4304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4304" }, { "cve": "CVE-2022-43552", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43552" }, { "cve": "CVE-2022-43680", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43680" }, { "cve": "CVE-2022-43750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43750" }, { "cve": "CVE-2022-4378", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4378" }, { "cve": "CVE-2022-43945", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43945" }, { "cve": "CVE-2022-43995", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43995" }, { "cve": "CVE-2022-4415", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4415" }, { "cve": "CVE-2022-4450", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4450" }, { "cve": "CVE-2022-44638", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-44638" }, { "cve": "CVE-2022-45061", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45061" }, { "cve": "CVE-2022-45688", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45688" }, { "cve": "CVE-2022-45884", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45884" }, { "cve": "CVE-2022-45885", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45885" }, { "cve": "CVE-2022-45886", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45886" }, { "cve": "CVE-2022-45887", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45887" }, { "cve": "CVE-2022-45919", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45919" }, { "cve": "CVE-2022-45934", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45934" }, { "cve": "CVE-2022-45939", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45939" }, { "cve": "CVE-2022-4662", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4662" }, { "cve": "CVE-2022-46751", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-46751" }, { "cve": "CVE-2022-46908", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-46908" }, { "cve": "CVE-2022-47629", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-47629" }, { "cve": "CVE-2022-47929", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-47929" }, { "cve": "CVE-2022-48281", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-48281" }, { "cve": "CVE-2022-48337", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-48337" }, { "cve": "CVE-2022-48339", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-48339" }, { "cve": "CVE-2023-0045", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0045" }, { "cve": "CVE-2023-0049", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0049" }, { "cve": "CVE-2023-0051", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0051" }, { "cve": "CVE-2023-0054", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0054" }, { "cve": "CVE-2023-0215", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0215" }, { "cve": "CVE-2023-0286", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0286" }, { "cve": "CVE-2023-0288", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0288" }, { "cve": "CVE-2023-0433", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0433" }, { "cve": "CVE-2023-0464", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0464" }, { "cve": "CVE-2023-0465", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0465" }, { "cve": "CVE-2023-0466", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0466" }, { "cve": "CVE-2023-0512", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0512" }, { "cve": "CVE-2023-0590", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0590" }, { "cve": "CVE-2023-0597", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0597" }, { "cve": "CVE-2023-0833", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0833" }, { "cve": "CVE-2023-1076", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1076" }, { "cve": "CVE-2023-1095", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1095" }, { "cve": "CVE-2023-1118", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1118" }, { "cve": "CVE-2023-1127", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1127" }, { "cve": "CVE-2023-1170", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1170" }, { "cve": "CVE-2023-1175", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1175" }, { "cve": "CVE-2023-1370", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1370" }, { "cve": "CVE-2023-1380", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1380" }, { "cve": "CVE-2023-1390", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1390" }, { "cve": "CVE-2023-1436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1436" }, { "cve": "CVE-2023-1513", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1513" }, { "cve": "CVE-2023-1611", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1611" }, { "cve": "CVE-2023-1670", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1670" }, { "cve": "CVE-2023-1855", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1855" }, { "cve": "CVE-2023-1989", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1989" }, { "cve": "CVE-2023-1990", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1990" }, { "cve": "CVE-2023-1998", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1998" }, { "cve": "CVE-2023-20862", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-20862" }, { "cve": "CVE-2023-2124", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2124" }, { "cve": "CVE-2023-2162", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2162" }, { "cve": "CVE-2023-2176", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2176" }, { "cve": "CVE-2023-21830", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21830" }, { "cve": "CVE-2023-21835", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21835" }, { "cve": "CVE-2023-21843", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21843" }, { "cve": "CVE-2023-21930", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21930" }, { "cve": "CVE-2023-21937", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21937" }, { "cve": "CVE-2023-21938", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21938" }, { "cve": "CVE-2023-21939", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21939" }, { "cve": "CVE-2023-2194", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2194" }, { "cve": "CVE-2023-21954", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21954" }, { "cve": "CVE-2023-21967", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21967" }, { "cve": "CVE-2023-21968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21968" }, { "cve": "CVE-2023-22490", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-22490" }, { "cve": "CVE-2023-2253", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2253" }, { "cve": "CVE-2023-22809", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-22809" }, { "cve": "CVE-2023-23454", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23454" }, { "cve": "CVE-2023-23455", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23455" }, { "cve": "CVE-2023-23559", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23559" }, { "cve": "CVE-2023-23916", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23916" }, { "cve": "CVE-2023-23946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23946" }, { "cve": "CVE-2023-24329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24329" }, { "cve": "CVE-2023-24532", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24532" }, { "cve": "CVE-2023-24534", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24534" }, { "cve": "CVE-2023-2483", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2483" }, { "cve": "CVE-2023-24998", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24998" }, { "cve": "CVE-2023-2513", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2513" }, { "cve": "CVE-2023-25193", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25193" }, { "cve": "CVE-2023-25652", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25652" }, { "cve": "CVE-2023-25690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25690" }, { "cve": "CVE-2023-25809", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25809" }, { "cve": "CVE-2023-25815", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25815" }, { "cve": "CVE-2023-26048", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26048" }, { "cve": "CVE-2023-26049", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26049" }, { "cve": "CVE-2023-2650", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2650" }, { "cve": "CVE-2023-26545", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26545" }, { "cve": "CVE-2023-26604", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26604" }, { "cve": "CVE-2023-27533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27533" }, { "cve": "CVE-2023-27534", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27534" }, { "cve": "CVE-2023-27535", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27535" }, { "cve": "CVE-2023-27536", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27536" }, { "cve": "CVE-2023-27538", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27538" }, { "cve": "CVE-2023-27561", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27561" }, { "cve": "CVE-2023-2828", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2828" }, { "cve": "CVE-2023-28320", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28320" }, { "cve": "CVE-2023-28321", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28321" }, { "cve": "CVE-2023-28322", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28322" }, { "cve": "CVE-2023-28328", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28328" }, { "cve": "CVE-2023-28464", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28464" }, { "cve": "CVE-2023-28486", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28486" }, { "cve": "CVE-2023-28487", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28487" }, { "cve": "CVE-2023-28642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28642" }, { "cve": "CVE-2023-28772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28772" }, { "cve": "CVE-2023-28840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28840" }, { "cve": "CVE-2023-28841", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28841" }, { "cve": "CVE-2023-28842", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28842" }, { "cve": "CVE-2023-29007", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29007" }, { "cve": "CVE-2023-29383", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29383" }, { "cve": "CVE-2023-29402", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29402" }, { "cve": "CVE-2023-29406", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29406" }, { "cve": "CVE-2023-29409", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29409" }, { "cve": "CVE-2023-2976", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2976" }, { "cve": "CVE-2023-30630", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-30630" }, { "cve": "CVE-2023-30772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-30772" }, { "cve": "CVE-2023-31084", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-31084" }, { "cve": "CVE-2023-3138", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-3138" }, { "cve": "CVE-2023-31436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-31436" }, { "cve": "CVE-2023-31484", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-31484" }, { "cve": "CVE-2023-32269", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-32269" }, { "cve": "CVE-2023-32697", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-32697" }, { "cve": "CVE-2023-33264", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-33264" }, { "cve": "CVE-2023-34034", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34034" }, { "cve": "CVE-2023-34035", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34035" }, { "cve": "CVE-2023-34453", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34453" }, { "cve": "CVE-2023-34454", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34454" }, { "cve": "CVE-2023-34455", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34455" }, { "cve": "CVE-2023-34462", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34462" }, { "cve": "CVE-2023-35116", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-35116" }, { "cve": "CVE-2023-3635", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-3635" }, { "cve": "CVE-2023-36479", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-36479" }, { "cve": "CVE-2023-39533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-39533" }, { "cve": "CVE-2023-40167", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-40167" }, { "cve": "CVE-2023-40217", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-40217" }, { "cve": "CVE-2023-41105", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-41105" }, { "cve": "CVE-2023-41900", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-41900" }, { "cve": "CVE-2023-43642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-43642" }, { "cve": "CVE-2023-43804", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-43804" }, { "cve": "CVE-2023-44487", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-44487" }, { "cve": "CVE-2023-45803", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-45803" }, { "cve": "CVE-2024-21626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2024-21626" } ] }
WID-SEC-W-2024-0794
Vulnerability from csaf_certbund
Published
2024-04-04 22:00
Modified
2024-04-04 22:00
Summary
Dell ECS: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Dell ECS ist ein Objektspeichersystem.
Angriff
Ein Angreifer kann mehrere Schwachstellen in Dell ECS ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
Betroffene Betriebssysteme
- Linux
- UNIX
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Dell ECS ist ein Objektspeichersystem.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Dell ECS ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0794 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0794.json" }, { "category": "self", "summary": "WID-SEC-2024-0794 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0794" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-141 vom 2024-04-04", "url": "https://www.dell.com/support/kbdoc/000223839/dsa-2024-=" } ], "source_lang": "en-US", "title": "Dell ECS: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-04-04T22:00:00.000+00:00", "generator": { "date": "2024-04-05T09:37:24.604+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-0794", "initial_release_date": "2024-04-04T22:00:00.000+00:00", "revision_history": [ { "date": "2024-04-04T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c 3.8.1.0", "product": { "name": "Dell ECS \u003c 3.8.1.0", "product_id": "T033919", "product_identification_helper": { "cpe": "cpe:/h:dell:ecs:3.8.1.0" } } } ], "category": "product_name", "name": "ECS" } ], "category": "vendor", "name": "Dell" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-18074", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2018-18074" }, { "cve": "CVE-2020-10663", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10663" }, { "cve": "CVE-2020-10672", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10672" }, { "cve": "CVE-2020-10673", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10673" }, { "cve": "CVE-2020-10735", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10735" }, { "cve": "CVE-2020-10968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10968" }, { "cve": "CVE-2020-10969", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10969" }, { "cve": "CVE-2020-11111", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11111" }, { "cve": "CVE-2020-11112", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11112" }, { "cve": "CVE-2020-11113", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11113" }, { "cve": "CVE-2020-11612", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11612" }, { "cve": "CVE-2020-11619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11619" }, { "cve": "CVE-2020-11620", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11620" }, { "cve": "CVE-2020-11979", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11979" }, { "cve": "CVE-2020-12762", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-12762" }, { "cve": "CVE-2020-12825", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-12825" }, { "cve": "CVE-2020-13956", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-13956" }, { "cve": "CVE-2020-14060", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14060" }, { "cve": "CVE-2020-14061", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14061" }, { "cve": "CVE-2020-14062", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14062" }, { "cve": "CVE-2020-14195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14195" }, { "cve": "CVE-2020-15250", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-15250" }, { "cve": "CVE-2020-1945", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-1945" }, { "cve": "CVE-2020-1967", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-1967" }, { "cve": "CVE-2020-1971", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-1971" }, { "cve": "CVE-2020-24616", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-24616" }, { "cve": "CVE-2020-24750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-24750" }, { "cve": "CVE-2020-25649", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-25649" }, { "cve": "CVE-2020-25658", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-25658" }, { "cve": "CVE-2020-26116", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-26116" }, { "cve": "CVE-2020-26137", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-26137" }, { "cve": "CVE-2020-26541", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-26541" }, { "cve": "CVE-2020-27216", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-27216" }, { "cve": "CVE-2020-27218", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-27218" }, { "cve": "CVE-2020-27223", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-27223" }, { "cve": "CVE-2020-28366", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-28366" }, { "cve": "CVE-2020-28493", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-28493" }, { "cve": "CVE-2020-29509", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29509" }, { "cve": "CVE-2020-29511", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29511" }, { "cve": "CVE-2020-29582", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29582" }, { "cve": "CVE-2020-29651", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29651" }, { "cve": "CVE-2020-35490", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-35490" }, { "cve": "CVE-2020-35491", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-35491" }, { "cve": "CVE-2020-35728", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-35728" }, { "cve": "CVE-2020-36179", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36179" }, { "cve": "CVE-2020-36180", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36180" }, { "cve": "CVE-2020-36181", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36181" }, { "cve": "CVE-2020-36182", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36182" }, { "cve": "CVE-2020-36183", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36183" }, { "cve": "CVE-2020-36184", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36184" }, { "cve": "CVE-2020-36185", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36185" }, { "cve": "CVE-2020-36186", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36186" }, { "cve": "CVE-2020-36187", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36187" }, { "cve": "CVE-2020-36188", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36188" }, { "cve": "CVE-2020-36189", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36189" }, { "cve": "CVE-2020-36516", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36516" }, { "cve": "CVE-2020-36518", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36518" }, { "cve": "CVE-2020-36557", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36557" }, { "cve": "CVE-2020-36558", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36558" }, { "cve": "CVE-2020-36691", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36691" }, { "cve": "CVE-2020-7238", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-7238" }, { "cve": "CVE-2020-8840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8840" }, { "cve": "CVE-2020-8908", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8908" }, { "cve": "CVE-2020-8911", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8911" }, { "cve": "CVE-2020-8912", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8912" }, { "cve": "CVE-2020-9488", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9488" }, { "cve": "CVE-2020-9493", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9493" }, { "cve": "CVE-2020-9546", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9546" }, { "cve": "CVE-2020-9547", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9547" }, { "cve": "CVE-2020-9548", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9548" }, { "cve": "CVE-2021-20190", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-20190" }, { "cve": "CVE-2021-20323", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-20323" }, { "cve": "CVE-2021-21290", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-21290" }, { "cve": "CVE-2021-21295", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-21295" }, { "cve": "CVE-2021-21409", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-21409" }, { "cve": "CVE-2021-23840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-23840" }, { "cve": "CVE-2021-23841", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-23841" }, { "cve": "CVE-2021-2471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-2471" }, { "cve": "CVE-2021-25642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-25642" }, { "cve": "CVE-2021-26341", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-26341" }, { "cve": "CVE-2021-27918", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-27918" }, { "cve": "CVE-2021-28153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28153" }, { "cve": "CVE-2021-28165", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28165" }, { "cve": "CVE-2021-28169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28169" }, { "cve": "CVE-2021-28861", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28861" }, { "cve": "CVE-2021-29425", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-29425" }, { "cve": "CVE-2021-30560", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-30560" }, { "cve": "CVE-2021-3114", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3114" }, { "cve": "CVE-2021-33036", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33036" }, { "cve": "CVE-2021-33194", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33194" }, { "cve": "CVE-2021-33195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33195" }, { "cve": "CVE-2021-33196", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33196" }, { "cve": "CVE-2021-33197", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33197" }, { "cve": "CVE-2021-33503", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33503" }, { "cve": "CVE-2021-33655", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33655" }, { "cve": "CVE-2021-33656", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33656" }, { "cve": "CVE-2021-3424", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3424" }, { "cve": "CVE-2021-34428", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-34428" }, { "cve": "CVE-2021-3449", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3449" }, { "cve": "CVE-2021-3450", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3450" }, { "cve": "CVE-2021-3530", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3530" }, { "cve": "CVE-2021-36221", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36221" }, { "cve": "CVE-2021-36373", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36373" }, { "cve": "CVE-2021-36374", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36374" }, { "cve": "CVE-2021-3648", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3648" }, { "cve": "CVE-2021-36690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36690" }, { "cve": "CVE-2021-3711", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3711" }, { "cve": "CVE-2021-3712", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3712" }, { "cve": "CVE-2021-37136", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37136" }, { "cve": "CVE-2021-37137", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37137" }, { "cve": "CVE-2021-37404", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37404" }, { "cve": "CVE-2021-37533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37533" }, { "cve": "CVE-2021-3754", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3754" }, { "cve": "CVE-2021-3778", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3778" }, { "cve": "CVE-2021-3796", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3796" }, { "cve": "CVE-2021-3826", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3826" }, { "cve": "CVE-2021-3827", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3827" }, { "cve": "CVE-2021-38297", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-38297" }, { "cve": "CVE-2021-3872", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3872" }, { "cve": "CVE-2021-3875", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3875" }, { "cve": "CVE-2021-3903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3903" }, { "cve": "CVE-2021-3923", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3923" }, { "cve": "CVE-2021-3927", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3927" }, { "cve": "CVE-2021-3928", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3928" }, { "cve": "CVE-2021-3968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3968" }, { "cve": "CVE-2021-3973", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3973" }, { "cve": "CVE-2021-3974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3974" }, { "cve": "CVE-2021-3984", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3984" }, { "cve": "CVE-2021-4019", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4019" }, { "cve": "CVE-2021-4037", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4037" }, { "cve": "CVE-2021-4069", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4069" }, { "cve": "CVE-2021-4104", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4104" }, { "cve": "CVE-2021-4136", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4136" }, { "cve": "CVE-2021-4157", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4157" }, { "cve": "CVE-2021-4166", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4166" }, { "cve": "CVE-2021-41771", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-41771" }, { "cve": "CVE-2021-4192", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4192" }, { "cve": "CVE-2021-4193", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4193" }, { "cve": "CVE-2021-4203", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4203" }, { "cve": "CVE-2021-42567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-42567" }, { "cve": "CVE-2021-43797", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-43797" }, { "cve": "CVE-2021-44531", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44531" }, { "cve": "CVE-2021-44532", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44532" }, { "cve": "CVE-2021-44533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44533" }, { "cve": "CVE-2021-44716", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44716" }, { "cve": "CVE-2021-44878", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44878" }, { "cve": "CVE-2021-45078", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-45078" }, { "cve": "CVE-2021-46195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-46195" }, { "cve": "CVE-2021-46828", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-46828" }, { "cve": "CVE-2021-46848", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-46848" }, { "cve": "CVE-2022-0128", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0128" }, { "cve": "CVE-2022-0213", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0213" }, { "cve": "CVE-2022-0225", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0225" }, { "cve": "CVE-2022-0261", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0261" }, { "cve": "CVE-2022-0318", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0318" }, { "cve": "CVE-2022-0319", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0319" }, { "cve": "CVE-2022-0351", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0351" }, { "cve": "CVE-2022-0359", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0359" }, { "cve": "CVE-2022-0361", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0361" }, { "cve": "CVE-2022-0392", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0392" }, { "cve": "CVE-2022-0407", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0407" }, { "cve": "CVE-2022-0413", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0413" }, { "cve": "CVE-2022-0561", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0561" }, { "cve": "CVE-2022-0696", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0696" }, { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-1184", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1184" }, { "cve": "CVE-2022-1245", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1245" }, { "cve": "CVE-2022-1271", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1271" }, { "cve": "CVE-2022-1292", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1292" }, { "cve": "CVE-2022-1381", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1381" }, { "cve": "CVE-2022-1420", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1420" }, { "cve": "CVE-2022-1462", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1462" }, { "cve": "CVE-2022-1466", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1466" }, { "cve": "CVE-2022-1471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1471" }, { "cve": "CVE-2022-1586", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1586" }, { "cve": "CVE-2022-1587", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1587" }, { "cve": "CVE-2022-1616", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1616" }, { "cve": "CVE-2022-1619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1619" }, { "cve": "CVE-2022-1620", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1620" }, { "cve": "CVE-2022-1679", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1679" }, { "cve": "CVE-2022-1705", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1705" }, { "cve": "CVE-2022-1720", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1720" }, { "cve": "CVE-2022-1729", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1729" }, { "cve": "CVE-2022-1733", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1733" }, { "cve": "CVE-2022-1735", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1735" }, { "cve": "CVE-2022-1771", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1771" }, { "cve": "CVE-2022-1785", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1785" }, { "cve": "CVE-2022-1796", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1796" }, { "cve": "CVE-2022-1851", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1851" }, { "cve": "CVE-2022-1897", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1897" }, { "cve": "CVE-2022-1898", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1898" }, { "cve": "CVE-2022-1927", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1927" }, { "cve": "CVE-2022-1962", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1962" }, { "cve": "CVE-2022-1968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1968" }, { "cve": "CVE-2022-1974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1974" }, { "cve": "CVE-2022-1975", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1975" }, { "cve": "CVE-2022-20132", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20132" }, { "cve": "CVE-2022-20141", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20141" }, { "cve": "CVE-2022-20154", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20154" }, { "cve": "CVE-2022-20166", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20166" }, { "cve": "CVE-2022-20368", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20368" }, { "cve": "CVE-2022-20369", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20369" }, { "cve": "CVE-2022-2047", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2047" }, { "cve": "CVE-2022-2048", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2048" }, { "cve": "CVE-2022-20567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20567" }, { "cve": "CVE-2022-2068", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2068" }, { "cve": "CVE-2022-2097", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2097" }, { "cve": "CVE-2022-21216", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21216" }, { "cve": "CVE-2022-21233", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21233" }, { "cve": "CVE-2022-2124", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2124" }, { "cve": "CVE-2022-2125", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2125" }, { "cve": "CVE-2022-2126", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2126" }, { "cve": "CVE-2022-2129", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2129" }, { "cve": "CVE-2022-21363", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21363" }, { "cve": "CVE-2022-21385", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21385" }, { "cve": "CVE-2022-21499", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21499" }, { "cve": "CVE-2022-2153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2153" }, { "cve": "CVE-2022-21540", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21540" }, { "cve": "CVE-2022-21541", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21541" }, { "cve": "CVE-2022-21549", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21549" }, { "cve": "CVE-2022-21618", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21618" }, { "cve": "CVE-2022-21619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21619" }, { "cve": "CVE-2022-21624", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21624" }, { "cve": "CVE-2022-21626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21626" }, { "cve": "CVE-2022-21628", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21628" }, { "cve": "CVE-2022-21702", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21702" }, { "cve": "CVE-2022-2175", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2175" }, { "cve": "CVE-2022-2182", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2182" }, { "cve": "CVE-2022-2183", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2183" }, { "cve": "CVE-2022-2206", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2206" }, { "cve": "CVE-2022-2207", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2207" }, { "cve": "CVE-2022-2208", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2208" }, { "cve": "CVE-2022-2210", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2210" }, { "cve": "CVE-2022-2231", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2231" }, { "cve": "CVE-2022-2256", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2256" }, { "cve": "CVE-2022-2257", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2257" }, { "cve": "CVE-2022-2264", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2264" }, { "cve": "CVE-2022-2284", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2284" }, { "cve": "CVE-2022-2285", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2285" }, { "cve": "CVE-2022-2286", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2286" }, { "cve": "CVE-2022-2287", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2287" }, { "cve": "CVE-2022-22976", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-22976" }, { "cve": "CVE-2022-22978", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-22978" }, { "cve": "CVE-2022-2304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2304" }, { "cve": "CVE-2022-2318", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2318" }, { "cve": "CVE-2022-23302", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23302" }, { "cve": "CVE-2022-23305", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23305" }, { "cve": "CVE-2022-23307", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23307" }, { "cve": "CVE-2022-2343", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2343" }, { "cve": "CVE-2022-2344", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2344" }, { "cve": "CVE-2022-2345", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2345" }, { "cve": "CVE-2022-23471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23471" }, { "cve": "CVE-2022-23521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23521" }, { "cve": "CVE-2022-23772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23772" }, { "cve": "CVE-2022-23773", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23773" }, { "cve": "CVE-2022-24302", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24302" }, { "cve": "CVE-2022-24329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24329" }, { "cve": "CVE-2022-24823", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24823" }, { "cve": "CVE-2022-24903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24903" }, { "cve": "CVE-2022-2503", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2503" }, { "cve": "CVE-2022-25147", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25147" }, { "cve": "CVE-2022-25168", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25168" }, { "cve": "CVE-2022-2519", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2519" }, { "cve": "CVE-2022-2520", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2520" }, { "cve": "CVE-2022-2521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2521" }, { "cve": "CVE-2022-2522", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2522" }, { "cve": "CVE-2022-25647", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25647" }, { "cve": "CVE-2022-2571", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2571" }, { "cve": "CVE-2022-2580", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2580" }, { "cve": "CVE-2022-2581", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2581" }, { "cve": "CVE-2022-25857", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25857" }, { "cve": "CVE-2022-2588", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2588" }, { "cve": "CVE-2022-2598", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2598" }, { "cve": "CVE-2022-26148", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26148" }, { "cve": "CVE-2022-26365", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26365" }, { "cve": "CVE-2022-26373", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26373" }, { "cve": "CVE-2022-2639", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2639" }, { "cve": "CVE-2022-26612", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26612" }, { "cve": "CVE-2022-2663", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2663" }, { "cve": "CVE-2022-27781", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-27781" }, { "cve": "CVE-2022-27782", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-27782" }, { "cve": "CVE-2022-27943", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-27943" }, { "cve": "CVE-2022-2795", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2795" }, { "cve": "CVE-2022-28131", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28131" }, { "cve": "CVE-2022-2816", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2816" }, { "cve": "CVE-2022-2817", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2817" }, { "cve": "CVE-2022-2819", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2819" }, { "cve": "CVE-2022-28327", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28327" }, { "cve": "CVE-2022-2845", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2845" }, { "cve": "CVE-2022-2849", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2849" }, { "cve": "CVE-2022-2862", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2862" }, { "cve": "CVE-2022-2867", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2867" }, { "cve": "CVE-2022-2868", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2868" }, { "cve": "CVE-2022-2869", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2869" }, { "cve": "CVE-2022-28693", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28693" }, { "cve": "CVE-2022-2874", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2874" }, { "cve": "CVE-2022-28748", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28748" }, { "cve": "CVE-2022-2880", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2880" }, { "cve": "CVE-2022-2889", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2889" }, { "cve": "CVE-2022-29162", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29162" }, { "cve": "CVE-2022-29187", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29187" }, { "cve": "CVE-2022-2923", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2923" }, { "cve": "CVE-2022-2946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2946" }, { "cve": "CVE-2022-29526", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29526" }, { "cve": "CVE-2022-29583", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29583" }, { "cve": "CVE-2022-2964", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2964" }, { "cve": "CVE-2022-2977", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2977" }, { "cve": "CVE-2022-2980", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2980" }, { "cve": "CVE-2022-2982", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2982" }, { "cve": "CVE-2022-29900", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29900" }, { "cve": "CVE-2022-29901", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29901" }, { "cve": "CVE-2022-2991", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2991" }, { "cve": "CVE-2022-3016", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3016" }, { "cve": "CVE-2022-3028", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3028" }, { "cve": "CVE-2022-3037", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3037" }, { "cve": "CVE-2022-30580", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30580" }, { "cve": "CVE-2022-30630", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30630" }, { "cve": "CVE-2022-30631", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30631" }, { "cve": "CVE-2022-30632", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30632" }, { "cve": "CVE-2022-30633", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30633" }, { "cve": "CVE-2022-3099", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3099" }, { "cve": "CVE-2022-31030", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-31030" }, { "cve": "CVE-2022-31159", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-31159" }, { "cve": "CVE-2022-3134", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3134" }, { "cve": "CVE-2022-3153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3153" }, { "cve": "CVE-2022-3169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3169" }, { "cve": "CVE-2022-31690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-31690" }, { "cve": "CVE-2022-32148", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32148" }, { "cve": "CVE-2022-32149", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32149" }, { "cve": "CVE-2022-32206", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32206" }, { "cve": "CVE-2022-32208", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32208" }, { "cve": "CVE-2022-32221", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32221" }, { "cve": "CVE-2022-3234", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3234" }, { "cve": "CVE-2022-3235", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3235" }, { "cve": "CVE-2022-3239", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3239" }, { "cve": "CVE-2022-3278", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3278" }, { "cve": "CVE-2022-3296", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3296" }, { "cve": "CVE-2022-3297", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3297" }, { "cve": "CVE-2022-33196", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33196" }, { "cve": "CVE-2022-3324", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3324" }, { "cve": "CVE-2022-3352", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3352" }, { "cve": "CVE-2022-33740", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33740" }, { "cve": "CVE-2022-33741", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33741" }, { "cve": "CVE-2022-33742", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33742" }, { "cve": "CVE-2022-33972", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33972" }, { "cve": "CVE-2022-33981", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33981" }, { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34169" }, { "cve": "CVE-2022-3424", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3424" }, { "cve": "CVE-2022-34266", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34266" }, { "cve": "CVE-2022-34526", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34526" }, { "cve": "CVE-2022-34903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34903" }, { "cve": "CVE-2022-3491", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3491" }, { "cve": "CVE-2022-3515", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3515" }, { "cve": "CVE-2022-3520", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3520" }, { "cve": "CVE-2022-3521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3521" }, { "cve": "CVE-2022-3524", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3524" }, { "cve": "CVE-2022-35252", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-35252" }, { "cve": "CVE-2022-3542", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3542" }, { "cve": "CVE-2022-3545", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3545" }, { "cve": "CVE-2022-3564", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3564" }, { "cve": "CVE-2022-3565", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3565" }, { "cve": "CVE-2022-3566", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3566" }, { "cve": "CVE-2022-3567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3567" }, { "cve": "CVE-2022-35737", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-35737" }, { "cve": "CVE-2022-3586", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3586" }, { "cve": "CVE-2022-3591", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3591" }, { "cve": "CVE-2022-3594", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3594" }, { "cve": "CVE-2022-3597", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3597" }, { "cve": "CVE-2022-3599", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3599" }, { "cve": "CVE-2022-36109", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36109" }, { "cve": "CVE-2022-3621", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3621" }, { "cve": "CVE-2022-3626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3626" }, { "cve": "CVE-2022-3627", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3627" }, { "cve": "CVE-2022-3628", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3628" }, { "cve": "CVE-2022-36280", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36280" }, { "cve": "CVE-2022-3629", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3629" }, { "cve": "CVE-2022-3635", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3635" }, { "cve": "CVE-2022-3643", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3643" }, { "cve": "CVE-2022-36437", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36437" }, { "cve": "CVE-2022-3646", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3646" }, { "cve": "CVE-2022-3649", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3649" }, { "cve": "CVE-2022-36760", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36760" }, { "cve": "CVE-2022-36879", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36879" }, { "cve": "CVE-2022-36946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36946" }, { "cve": "CVE-2022-3705", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3705" }, { "cve": "CVE-2022-37434", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37434" }, { "cve": "CVE-2022-37436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37436" }, { "cve": "CVE-2022-37865", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37865" }, { "cve": "CVE-2022-37866", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37866" }, { "cve": "CVE-2022-38090", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38090" }, { "cve": "CVE-2022-38096", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38096" }, { "cve": "CVE-2022-38126", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38126" }, { "cve": "CVE-2022-38127", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38127" }, { "cve": "CVE-2022-38177", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38177" }, { "cve": "CVE-2022-38178", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38178" }, { "cve": "CVE-2022-3821", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3821" }, { "cve": "CVE-2022-38533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38533" }, { "cve": "CVE-2022-38749", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38749" }, { "cve": "CVE-2022-38750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38750" }, { "cve": "CVE-2022-38751", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38751" }, { "cve": "CVE-2022-38752", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38752" }, { "cve": "CVE-2022-39028", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-39028" }, { "cve": "CVE-2022-3903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3903" }, { "cve": "CVE-2022-39188", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-39188" }, { "cve": "CVE-2022-39399", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-39399" }, { "cve": "CVE-2022-3970", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3970" }, { "cve": "CVE-2022-40149", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40149" }, { "cve": "CVE-2022-40150", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40150" }, { "cve": "CVE-2022-40151", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40151" }, { "cve": "CVE-2022-40152", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40152" }, { "cve": "CVE-2022-40153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40153" }, { "cve": "CVE-2022-40303", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40303" }, { "cve": "CVE-2022-40304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40304" }, { "cve": "CVE-2022-40307", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40307" }, { "cve": "CVE-2022-40674", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40674" }, { "cve": "CVE-2022-40768", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40768" }, { "cve": "CVE-2022-40899", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40899" }, { "cve": "CVE-2022-4095", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4095" }, { "cve": "CVE-2022-41218", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41218" }, { "cve": "CVE-2022-4129", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4129" }, { "cve": "CVE-2022-4141", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4141" }, { "cve": "CVE-2022-41717", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41717" }, { "cve": "CVE-2022-41721", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41721" }, { "cve": "CVE-2022-41848", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41848" }, { "cve": "CVE-2022-41850", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41850" }, { "cve": "CVE-2022-41854", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41854" }, { "cve": "CVE-2022-41858", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41858" }, { "cve": "CVE-2022-41881", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41881" }, { "cve": "CVE-2022-41903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41903" }, { "cve": "CVE-2022-41915", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41915" }, { "cve": "CVE-2022-41966", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41966" }, { "cve": "CVE-2022-41974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41974" }, { "cve": "CVE-2022-42003", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42003" }, { "cve": "CVE-2022-42004", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42004" }, { "cve": "CVE-2022-42010", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42010" }, { "cve": "CVE-2022-42011", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42011" }, { "cve": "CVE-2022-42012", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42012" }, { "cve": "CVE-2022-42328", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42328" }, { "cve": "CVE-2022-42329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42329" }, { "cve": "CVE-2022-42703", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42703" }, { "cve": "CVE-2022-42889", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42889" }, { "cve": "CVE-2022-42895", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42895" }, { "cve": "CVE-2022-42896", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42896" }, { "cve": "CVE-2022-42898", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42898" }, { "cve": "CVE-2022-4292", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4292" }, { "cve": "CVE-2022-4293", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4293" }, { "cve": "CVE-2022-42969", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42969" }, { "cve": "CVE-2022-4304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4304" }, { "cve": "CVE-2022-43552", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43552" }, { "cve": "CVE-2022-43680", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43680" }, { "cve": "CVE-2022-43750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43750" }, { "cve": "CVE-2022-4378", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4378" }, { "cve": "CVE-2022-43945", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43945" }, { "cve": "CVE-2022-43995", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43995" }, { "cve": "CVE-2022-4415", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4415" }, { "cve": "CVE-2022-4450", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4450" }, { "cve": "CVE-2022-44638", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-44638" }, { "cve": "CVE-2022-45061", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45061" }, { "cve": "CVE-2022-45688", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45688" }, { "cve": "CVE-2022-45884", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45884" }, { "cve": "CVE-2022-45885", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45885" }, { "cve": "CVE-2022-45886", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45886" }, { "cve": "CVE-2022-45887", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45887" }, { "cve": "CVE-2022-45919", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45919" }, { "cve": "CVE-2022-45934", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45934" }, { "cve": "CVE-2022-45939", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45939" }, { "cve": "CVE-2022-4662", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4662" }, { "cve": "CVE-2022-46751", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-46751" }, { "cve": "CVE-2022-46908", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-46908" }, { "cve": "CVE-2022-47629", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-47629" }, { "cve": "CVE-2022-47929", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-47929" }, { "cve": "CVE-2022-48281", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-48281" }, { "cve": "CVE-2022-48337", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-48337" }, { "cve": "CVE-2022-48339", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-48339" }, { "cve": "CVE-2023-0045", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0045" }, { "cve": "CVE-2023-0049", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0049" }, { "cve": "CVE-2023-0051", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0051" }, { "cve": "CVE-2023-0054", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0054" }, { "cve": "CVE-2023-0215", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0215" }, { "cve": "CVE-2023-0286", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0286" }, { "cve": "CVE-2023-0288", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0288" }, { "cve": "CVE-2023-0433", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0433" }, { "cve": "CVE-2023-0464", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0464" }, { "cve": "CVE-2023-0465", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0465" }, { "cve": "CVE-2023-0466", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0466" }, { "cve": "CVE-2023-0512", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0512" }, { "cve": "CVE-2023-0590", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0590" }, { "cve": "CVE-2023-0597", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0597" }, { "cve": "CVE-2023-0833", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0833" }, { "cve": "CVE-2023-1076", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1076" }, { "cve": "CVE-2023-1095", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1095" }, { "cve": "CVE-2023-1118", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1118" }, { "cve": "CVE-2023-1127", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1127" }, { "cve": "CVE-2023-1170", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1170" }, { "cve": "CVE-2023-1175", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1175" }, { "cve": "CVE-2023-1370", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1370" }, { "cve": "CVE-2023-1380", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1380" }, { "cve": "CVE-2023-1390", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1390" }, { "cve": "CVE-2023-1436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1436" }, { "cve": "CVE-2023-1513", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1513" }, { "cve": "CVE-2023-1611", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1611" }, { "cve": "CVE-2023-1670", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1670" }, { "cve": "CVE-2023-1855", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1855" }, { "cve": "CVE-2023-1989", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1989" }, { "cve": "CVE-2023-1990", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1990" }, { "cve": "CVE-2023-1998", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1998" }, { "cve": "CVE-2023-20862", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-20862" }, { "cve": "CVE-2023-2124", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2124" }, { "cve": "CVE-2023-2162", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2162" }, { "cve": "CVE-2023-2176", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2176" }, { "cve": "CVE-2023-21830", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21830" }, { "cve": "CVE-2023-21835", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21835" }, { "cve": "CVE-2023-21843", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21843" }, { "cve": "CVE-2023-21930", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21930" }, { "cve": "CVE-2023-21937", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21937" }, { "cve": "CVE-2023-21938", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21938" }, { "cve": "CVE-2023-21939", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21939" }, { "cve": "CVE-2023-2194", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2194" }, { "cve": "CVE-2023-21954", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21954" }, { "cve": "CVE-2023-21967", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21967" }, { "cve": "CVE-2023-21968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21968" }, { "cve": "CVE-2023-22490", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-22490" }, { "cve": "CVE-2023-2253", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2253" }, { "cve": "CVE-2023-22809", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-22809" }, { "cve": "CVE-2023-23454", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23454" }, { "cve": "CVE-2023-23455", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23455" }, { "cve": "CVE-2023-23559", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23559" }, { "cve": "CVE-2023-23916", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23916" }, { "cve": "CVE-2023-23946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23946" }, { "cve": "CVE-2023-24329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24329" }, { "cve": "CVE-2023-24532", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24532" }, { "cve": "CVE-2023-24534", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24534" }, { "cve": "CVE-2023-2483", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2483" }, { "cve": "CVE-2023-24998", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24998" }, { "cve": "CVE-2023-2513", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2513" }, { "cve": "CVE-2023-25193", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25193" }, { "cve": "CVE-2023-25652", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25652" }, { "cve": "CVE-2023-25690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25690" }, { "cve": "CVE-2023-25809", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25809" }, { "cve": "CVE-2023-25815", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25815" }, { "cve": "CVE-2023-26048", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26048" }, { "cve": "CVE-2023-26049", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26049" }, { "cve": "CVE-2023-2650", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2650" }, { "cve": "CVE-2023-26545", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26545" }, { "cve": "CVE-2023-26604", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26604" }, { "cve": "CVE-2023-27533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27533" }, { "cve": "CVE-2023-27534", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27534" }, { "cve": "CVE-2023-27535", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27535" }, { "cve": "CVE-2023-27536", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27536" }, { "cve": "CVE-2023-27538", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27538" }, { "cve": "CVE-2023-27561", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27561" }, { "cve": "CVE-2023-2828", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2828" }, { "cve": "CVE-2023-28320", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28320" }, { "cve": "CVE-2023-28321", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28321" }, { "cve": "CVE-2023-28322", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28322" }, { "cve": "CVE-2023-28328", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28328" }, { "cve": "CVE-2023-28464", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28464" }, { "cve": "CVE-2023-28486", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28486" }, { "cve": "CVE-2023-28487", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28487" }, { "cve": "CVE-2023-28642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28642" }, { "cve": "CVE-2023-28772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28772" }, { "cve": "CVE-2023-28840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28840" }, { "cve": "CVE-2023-28841", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28841" }, { "cve": "CVE-2023-28842", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28842" }, { "cve": "CVE-2023-29007", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29007" }, { "cve": "CVE-2023-29383", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29383" }, { "cve": "CVE-2023-29402", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29402" }, { "cve": "CVE-2023-29406", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29406" }, { "cve": "CVE-2023-29409", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29409" }, { "cve": "CVE-2023-2976", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2976" }, { "cve": "CVE-2023-30630", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-30630" }, { "cve": "CVE-2023-30772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-30772" }, { "cve": "CVE-2023-31084", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-31084" }, { "cve": "CVE-2023-3138", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-3138" }, { "cve": "CVE-2023-31436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-31436" }, { "cve": "CVE-2023-31484", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-31484" }, { "cve": "CVE-2023-32269", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-32269" }, { "cve": "CVE-2023-32697", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-32697" }, { "cve": "CVE-2023-33264", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-33264" }, { "cve": "CVE-2023-34034", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34034" }, { "cve": "CVE-2023-34035", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34035" }, { "cve": "CVE-2023-34453", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34453" }, { "cve": "CVE-2023-34454", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34454" }, { "cve": "CVE-2023-34455", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34455" }, { "cve": "CVE-2023-34462", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34462" }, { "cve": "CVE-2023-35116", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-35116" }, { "cve": "CVE-2023-3635", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-3635" }, { "cve": "CVE-2023-36479", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-36479" }, { "cve": "CVE-2023-39533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-39533" }, { "cve": "CVE-2023-40167", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-40167" }, { "cve": "CVE-2023-40217", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-40217" }, { "cve": "CVE-2023-41105", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-41105" }, { "cve": "CVE-2023-41900", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-41900" }, { "cve": "CVE-2023-43642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-43642" }, { "cve": "CVE-2023-43804", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-43804" }, { "cve": "CVE-2023-44487", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-44487" }, { "cve": "CVE-2023-45803", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-45803" }, { "cve": "CVE-2024-21626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2024-21626" } ] }
WID-SEC-W-2022-0515
Vulnerability from csaf_certbund
Published
2022-06-29 22:00
Modified
2023-06-08 22:00
Summary
IBM Spectrum Protect: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
IBM Spectrum Protect ist eine zentralisierte Backuplösung für Systeme im Netzwerk.
Angriff
Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in IBM Spectrum Protect ausnutzen, um einen Denial-of-Service-Zustand herbeizuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuführen.
Betroffene Betriebssysteme
- Linux
- MacOS X
- Windows
- Sonstiges
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM Spectrum Protect ist eine zentralisierte Backupl\u00f6sung f\u00fcr Systeme im Netzwerk.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in IBM Spectrum Protect ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- MacOS X\n- Windows\n- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0515 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0515.json" }, { "category": "self", "summary": "WID-SEC-2022-0515 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0515" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6151-1 vom 2023-06-09", "url": "https://ubuntu.com/security/notices/USN-6151-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5984-1 vom 2023-03-29", "url": "https://www.cybersecurity-help.cz/vdb/SB2023032948" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596399" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596907" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596881" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596741" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596883" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596971" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596895" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596379" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596877" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596875" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2022-027 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2022-027.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2022-029 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2022-029.html" }, { "category": "external", "summary": "IBM Security Bulletin 6618019 vom 2022-09-03", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-information-disclosure-and-denial-of-service-vulnerabilities-in-the-ibm-spectrum-protect-backup-archive-client-may-affect-ibm-spectrum-protect-for-space-management-cve-2022-22478/" } ], "source_lang": "en-US", "title": "IBM Spectrum Protect: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-06-08T22:00:00.000+00:00", "generator": { "date": "2024-02-15T16:50:32.847+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-0515", "initial_release_date": "2022-06-29T22:00:00.000+00:00", "revision_history": [ { "date": "2022-06-29T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-07-20T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-09-04T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-03-29T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2023-06-08T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Ubuntu aufgenommen" } ], "status": "final", "version": "5" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM Spectrum Protect 8.1", "product": { "name": "IBM Spectrum Protect 8.1", "product_id": "T010033", "product_identification_helper": { "cpe": "cpe:/a:ibm:spectrum_protect:8.1" } } }, { "category": "product_name", "name": "IBM Spectrum Protect 10.1", "product": { "name": "IBM Spectrum Protect 10.1", "product_id": "T023649", "product_identification_helper": { "cpe": "cpe:/a:ibm:spectrum_protect:10.1" } } } ], "category": "product_name", "name": "Spectrum Protect" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-25704", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2020-25704" }, { "cve": "CVE-2020-29368", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2020-29368" }, { "cve": "CVE-2020-36322", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2020-36322" }, { "cve": "CVE-2020-36385", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2020-36385" }, { "cve": "CVE-2021-20269", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-20269" }, { "cve": "CVE-2021-20321", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-20321" }, { "cve": "CVE-2021-20322", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-20322" }, { "cve": "CVE-2021-21781", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-21781" }, { "cve": "CVE-2021-28950", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-28950" }, { "cve": "CVE-2021-28971", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-28971" }, { "cve": "CVE-2021-29650", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-29650" }, { "cve": "CVE-2021-31916", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-31916" }, { "cve": "CVE-2021-35550", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-35550" }, { "cve": "CVE-2021-35603", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-35603" }, { "cve": "CVE-2021-3573", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-3573" }, { "cve": "CVE-2021-3635", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-3635" }, { "cve": "CVE-2021-3669", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-3669" }, { "cve": "CVE-2021-3764", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-3764" }, { "cve": "CVE-2021-38201", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-38201" }, { "cve": "CVE-2021-38561", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-38561" }, { "cve": "CVE-2021-4002", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-4002" }, { "cve": "CVE-2021-4028", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-4028" }, { "cve": "CVE-2021-4083", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-4083" }, { "cve": "CVE-2021-4154", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-4154" }, { "cve": "CVE-2021-4155", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-4155" }, { "cve": "CVE-2021-4157", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-4157" }, { "cve": "CVE-2021-41864", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-41864" }, { "cve": "CVE-2021-4197", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-4197" }, { "cve": "CVE-2021-4203", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-4203" }, { "cve": "CVE-2021-43565", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-43565" }, { "cve": "CVE-2021-44733", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-44733" }, { "cve": "CVE-2021-45485", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-45485" }, { "cve": "CVE-2021-45486", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-45486" }, { "cve": "CVE-2022-0185", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-0185" }, { "cve": "CVE-2022-0286", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-0286" }, { "cve": "CVE-2022-0492", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-0492" }, { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-0847", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-0847" }, { "cve": "CVE-2022-0850", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-0850" }, { "cve": "CVE-2022-1011", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-1011" }, { "cve": "CVE-2022-22472", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-22472" }, { "cve": "CVE-2022-22474", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-22474" }, { "cve": "CVE-2022-22478", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-22478" }, { "cve": "CVE-2022-22487", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-22487" }, { "cve": "CVE-2022-22494", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-22494" }, { "cve": "CVE-2022-22496", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-22496" }, { "cve": "CVE-2022-22942", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-22942" }, { "cve": "CVE-2022-24675", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-24675" }, { "cve": "CVE-2022-24842", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-24842" }, { "cve": "CVE-2022-27536", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-27536" }, { "cve": "CVE-2022-28327", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-28327" } ] }
wid-sec-w-2022-0515
Vulnerability from csaf_certbund
Published
2022-06-29 22:00
Modified
2023-06-08 22:00
Summary
IBM Spectrum Protect: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
IBM Spectrum Protect ist eine zentralisierte Backuplösung für Systeme im Netzwerk.
Angriff
Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in IBM Spectrum Protect ausnutzen, um einen Denial-of-Service-Zustand herbeizuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuführen.
Betroffene Betriebssysteme
- Linux
- MacOS X
- Windows
- Sonstiges
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM Spectrum Protect ist eine zentralisierte Backupl\u00f6sung f\u00fcr Systeme im Netzwerk.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in IBM Spectrum Protect ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- MacOS X\n- Windows\n- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0515 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0515.json" }, { "category": "self", "summary": "WID-SEC-2022-0515 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0515" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6151-1 vom 2023-06-09", "url": "https://ubuntu.com/security/notices/USN-6151-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5984-1 vom 2023-03-29", "url": "https://www.cybersecurity-help.cz/vdb/SB2023032948" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596399" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596907" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596881" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596741" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596883" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596971" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596895" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596379" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596877" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596875" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2022-027 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2022-027.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2022-029 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2022-029.html" }, { "category": "external", "summary": "IBM Security Bulletin 6618019 vom 2022-09-03", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-information-disclosure-and-denial-of-service-vulnerabilities-in-the-ibm-spectrum-protect-backup-archive-client-may-affect-ibm-spectrum-protect-for-space-management-cve-2022-22478/" } ], "source_lang": "en-US", "title": "IBM Spectrum Protect: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-06-08T22:00:00.000+00:00", "generator": { "date": "2024-02-15T16:50:32.847+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-0515", "initial_release_date": "2022-06-29T22:00:00.000+00:00", "revision_history": [ { "date": "2022-06-29T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-07-20T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-09-04T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-03-29T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2023-06-08T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Ubuntu aufgenommen" } ], "status": "final", "version": "5" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM Spectrum Protect 8.1", "product": { "name": "IBM Spectrum Protect 8.1", "product_id": "T010033", "product_identification_helper": { "cpe": "cpe:/a:ibm:spectrum_protect:8.1" } } }, { "category": "product_name", "name": "IBM Spectrum Protect 10.1", "product": { "name": "IBM Spectrum Protect 10.1", "product_id": "T023649", "product_identification_helper": { "cpe": "cpe:/a:ibm:spectrum_protect:10.1" } } } ], "category": "product_name", "name": "Spectrum Protect" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-25704", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2020-25704" }, { "cve": "CVE-2020-29368", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2020-29368" }, { "cve": "CVE-2020-36322", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2020-36322" }, { "cve": "CVE-2020-36385", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2020-36385" }, { "cve": "CVE-2021-20269", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-20269" }, { "cve": "CVE-2021-20321", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-20321" }, { "cve": "CVE-2021-20322", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-20322" }, { "cve": "CVE-2021-21781", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-21781" }, { "cve": "CVE-2021-28950", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-28950" }, { "cve": "CVE-2021-28971", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-28971" }, { "cve": "CVE-2021-29650", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-29650" }, { "cve": "CVE-2021-31916", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-31916" }, { "cve": "CVE-2021-35550", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-35550" }, { "cve": "CVE-2021-35603", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-35603" }, { "cve": "CVE-2021-3573", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-3573" }, { "cve": "CVE-2021-3635", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-3635" }, { "cve": "CVE-2021-3669", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-3669" }, { "cve": "CVE-2021-3764", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-3764" }, { "cve": "CVE-2021-38201", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-38201" }, { "cve": "CVE-2021-38561", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-38561" }, { "cve": "CVE-2021-4002", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-4002" }, { "cve": "CVE-2021-4028", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-4028" }, { "cve": "CVE-2021-4083", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-4083" }, { "cve": "CVE-2021-4154", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-4154" }, { "cve": "CVE-2021-4155", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-4155" }, { "cve": "CVE-2021-4157", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-4157" }, { "cve": "CVE-2021-41864", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-41864" }, { "cve": "CVE-2021-4197", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-4197" }, { "cve": "CVE-2021-4203", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-4203" }, { "cve": "CVE-2021-43565", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-43565" }, { "cve": "CVE-2021-44733", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-44733" }, { "cve": "CVE-2021-45485", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-45485" }, { "cve": "CVE-2021-45486", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-45486" }, { "cve": "CVE-2022-0185", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-0185" }, { "cve": "CVE-2022-0286", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-0286" }, { "cve": "CVE-2022-0492", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-0492" }, { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-0847", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-0847" }, { "cve": "CVE-2022-0850", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-0850" }, { "cve": "CVE-2022-1011", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-1011" }, { "cve": "CVE-2022-22472", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-22472" }, { "cve": "CVE-2022-22474", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-22474" }, { "cve": "CVE-2022-22478", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-22478" }, { "cve": "CVE-2022-22487", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-22487" }, { "cve": "CVE-2022-22494", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-22494" }, { "cve": "CVE-2022-22496", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-22496" }, { "cve": "CVE-2022-22942", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-22942" }, { "cve": "CVE-2022-24675", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-24675" }, { "cve": "CVE-2022-24842", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-24842" }, { "cve": "CVE-2022-27536", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-27536" }, { "cve": "CVE-2022-28327", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-28327" } ] }
gsd-2021-4157
Vulnerability from gsd
Modified
2023-12-13 01:23
Details
An out of memory bounds write flaw (1 or 2 bytes of memory) in the Linux kernel NFS subsystem was found in the way users use mirroring (replication of files with NFS). A user, having access to the NFS mount, could potentially use this flaw to crash the system or escalate privileges on the system.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2021-4157", "description": "An out of memory bounds write flaw (1 or 2 bytes of memory) in the Linux kernel NFS subsystem was found in the way users use mirroring (replication of files with NFS). A user, having access to the NFS mount, could potentially use this flaw to crash the system or escalate privileges on the system.", "id": "GSD-2021-4157", "references": [ "https://www.suse.com/security/cve/CVE-2021-4157.html", "https://linux.oracle.com/cve/CVE-2021-4157.html", "https://access.redhat.com/errata/RHSA-2022:1975", "https://access.redhat.com/errata/RHSA-2022:1988", "https://ubuntu.com/security/CVE-2021-4157" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2021-4157" ], "details": "An out of memory bounds write flaw (1 or 2 bytes of memory) in the Linux kernel NFS subsystem was found in the way users use mirroring (replication of files with NFS). A user, having access to the NFS mount, could potentially use this flaw to crash the system or escalate privileges on the system.", "id": "GSD-2021-4157", "modified": "2023-12-13T01:23:11.719967Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2021-4157", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "kernel", "version": { "version_data": [ { "version_value": "kernel 5.13-rc1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An out of memory bounds write flaw (1 or 2 bytes of memory) in the Linux kernel NFS subsystem was found in the way users use mirroring (replication of files with NFS). A user, having access to the NFS mount, could potentially use this flaw to crash the system or escalate privileges on the system." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2034342", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034342" }, { "name": "https://lore.kernel.org/lkml/20210517140244.822185482@linuxfoundation.org/", "refsource": "MISC", "url": "https://lore.kernel.org/lkml/20210517140244.822185482@linuxfoundation.org/" }, { "name": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "name": "https://security.netapp.com/advisory/ntap-20220602-0007/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20220602-0007/" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.4.269", "versionStartIncluding": "4.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.9.269", "versionStartIncluding": "4.5", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.14.233", "versionStartIncluding": "4.10", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.19.191", "versionStartIncluding": "4.15", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "5.4.120", "versionStartIncluding": "4.20", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "5.10.38", "versionStartIncluding": "5.5", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "5.11.22", "versionStartIncluding": "5.11", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "5.12.5", "versionStartIncluding": "5.12", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2021-4157" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "An out of memory bounds write flaw (1 or 2 bytes of memory) in the Linux kernel NFS subsystem was found in the way users use mirroring (replication of files with NFS). A user, having access to the NFS mount, could potentially use this flaw to crash the system or escalate privileges on the system." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2034342", "refsource": "MISC", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034342" }, { "name": "https://lore.kernel.org/lkml/20210517140244.822185482@linuxfoundation.org/", "refsource": "MISC", "tags": [ "Exploit", "Mailing List", "Patch", "Vendor Advisory" ], "url": "https://lore.kernel.org/lkml/20210517140244.822185482@linuxfoundation.org/" }, { "name": "https://security.netapp.com/advisory/ntap-20220602-0007/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220602-0007/" }, { "name": "N/A", "refsource": "N/A", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 7.4, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 4.4, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 5.9 } }, "lastModifiedDate": "2023-01-17T21:23Z", "publishedDate": "2022-03-25T19:15Z" } } }
ghsa-5w94-r98f-mc64
Vulnerability from github
Published
2022-03-26 00:00
Modified
2022-04-08 00:00
Severity ?
Details
An out of memory bounds write flaw (1 or 2 bytes of memory) in the Linux kernel NFS subsystem was found in the way users use mirroring (replication of files with NFS). A user, having access to the NFS mount, could potentially use this flaw to crash the system or escalate privileges on the system.
{ "affected": [], "aliases": [ "CVE-2021-4157" ], "database_specific": { "cwe_ids": [ "CWE-119" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2022-03-25T19:15:00Z", "severity": "HIGH" }, "details": "An out of memory bounds write flaw (1 or 2 bytes of memory) in the Linux kernel NFS subsystem was found in the way users use mirroring (replication of files with NFS). A user, having access to the NFS mount, could potentially use this flaw to crash the system or escalate privileges on the system.", "id": "GHSA-5w94-r98f-mc64", "modified": "2022-04-08T00:00:39Z", "published": "2022-03-26T00:00:30Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4157" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034342" }, { "type": "WEB", "url": "https://lore.kernel.org/lkml/20210517140244.822185482@linuxfoundation.org" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20220602-0007" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.